:04:31 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x1200}}) 11:04:31 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xe7ffffff}}) 11:04:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = eventfd2(0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) setsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000000), 0x4) r3 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_read_part_table(0x0, 0x2, &(0x7f0000000bc0)=[{0x0, 0x0, 0xfff}, {&(0x7f0000000a00)="c9", 0x1}]) [ 1283.633561][T22969] /dev/loop0: Can't open blockdev [ 1283.639615][T22951] XFS (loop3): Invalid superblock magic number [ 1283.688433][T22975] /dev/loop0: Can't open blockdev [ 1283.744023][T22974] Dev loop5: unable to read RDB block 15 [ 1283.749919][T22974] loop5: unable to read partition table [ 1283.768313][T22974] loop5: partition table beyond EOD, truncated [ 1283.790595][T22974] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 11:04:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8000000000000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x1400}}) 11:04:31 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x6}) 11:04:31 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xfdfdffff}}) 11:04:31 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:31 executing program 5: r0 = socket$inet(0x10, 0x10000000003, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) r4 = openat$cgroup_ro(r3, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) connect$inet(r4, &(0x7f00000000c0)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000200)=""/225, &(0x7f0000000040)=0xe1) setresuid(0x0, r5, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000530407041d0600000000000000200a1009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 11:04:32 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x7}) 11:04:32 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xfffffdfd}}) [ 1284.337260][T22998] /dev/loop0: Can't open blockdev 11:04:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x1e00}}) [ 1284.385774][T23006] /dev/loop0: Can't open blockdev 11:04:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000eb0000000c0000000c00000003000000000000040000000000000000005f00551c3ab7fc3725a1398d7603ae7c26c49f45d7900ba3d45019f8524a5a2ed9957d8627b97d866954e3500342522eed1e7e25019b080c848457bff018d49e8befe45a298eb8f9f5fc408e71a492e54d3158540ff01936561d2521ac87511849bf84f7bdaeaf393d9ffeb1"], &(0x7f0000000280)=""/237, 0x27, 0xed, 0x1}, 0x20) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x200) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, r4, 0x8, &(0x7f0000000a00)={0x0, 0x9}, 0x8, 0x10, &(0x7f0000000300), 0x10}, 0x70) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, 0x0, 0x2, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 11:04:32 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x10', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1284.458265][T23003] XFS (loop3): Invalid superblock magic number 11:04:32 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xffffffe7}}) [ 1284.900206][T23003] XFS (loop3): Invalid superblock magic number 11:04:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8096980000000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:32 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x8}) 11:04:32 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xffffffff}}) 11:04:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x2500}}) 11:04:32 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x300) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000eb0000000c0000000c00000003000000000000040000000000000000005f00551c3ab7fc3725a1398d7603ae7c26c49f45d7900ba3d45019f8524a5a2ed9957d8627b97d866954e3500342522eed1e7e25019b080c848457bff018d49e8befe45a298eb8f9f5fc408e71a492e54d3158540ff01936561d2521ac87511849bf84f7bdaeaf393d9ffeb1"], &(0x7f0000000280)=""/237, 0x27, 0xed, 0x1}, 0x20) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x200) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000500), 0x12) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x9f, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, r4, 0x8, &(0x7f0000000a00)={0x0, 0x9}, 0x8, 0x10, &(0x7f0000000300), 0x10}, 0x70) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_subtree(r3, 0x0, 0x2, 0x0) socketpair(0x5, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000640)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 11:04:32 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1285.235246][T23051] /dev/loop0: Can't open blockdev 11:04:33 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x9}) 11:04:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x3f00}}) [ 1285.330960][T23063] /dev/loop0: Can't open blockdev 11:04:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000140)=0x1) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0xa00}, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x2d800) 11:04:33 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x2}) [ 1285.432325][T23057] XFS (loop3): Invalid superblock magic number 11:04:33 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xa}) [ 1285.808091][T23057] XFS (loop3): Invalid superblock magic number 11:04:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:33 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x4000}}) 11:04:33 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xb}) 11:04:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(r4, &(0x7f0000000540)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e75a4e0159f860e33823bf47843535af3a818d057ef622662eeb208b33f2099cb06c4c9d1cf9416af6b5075e2c24316681233fc626ba2af632dc3150afd5f94459908d3a17683c08e0a1c80638e5e3e864b8946f30fd18faa16f02b2830982be94b57f97e49980adf47df042c760c0a30323e7ab4db2dca67b1904737328a374de84429e4c38866a2a33c531e8d03ea84a31a5760dca6af12e81d32530d2eb95141ec5c5d4a1bd2fa7aa1c9545a9b824d13fed5a717db5585e8cef0e890868ecdc300b433fc5f1ec9ea680da4e37ef200"/243], 0x15) r5 = dup(r4) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$FUSE_BMAP(r5, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r5, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) 11:04:33 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x3}) [ 1286.164958][T23106] /dev/loop0: Can't open blockdev 11:04:33 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xc}) 11:04:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x5c00}}) 11:04:33 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x4}) [ 1286.188842][T23111] /dev/loop0: Can't open blockdev 11:04:34 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xd}) 11:04:34 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5}) [ 1286.300895][T23109] XFS (loop3): Invalid superblock magic number [ 1286.430569][T23131] /dev/loop0: Can't open blockdev [ 1286.452853][T23135] /dev/loop0: Can't open blockdev 11:04:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc400000000000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:34 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xe7ff}}) 11:04:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe}) 11:04:34 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000480)="9ac016d63d331c13213f") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) r5 = socket$rds(0x15, 0x5, 0x0) bind$rds(r5, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="580000000000000014010000080000000000000000000000999999999999999900"/75], 0x58}, 0x0) ioctl$FICLONE(r5, 0x40049409, r4) ioctl$KVM_RUN(r3, 0xae80, 0x0) pread64(r2, &(0x7f0000000100)=""/175, 0xaf, 0x200) r6 = gettid() setreuid(0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) process_vm_writev(r6, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x35c}], 0x329, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) 11:04:34 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:34 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x6}) 11:04:34 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x7}) 11:04:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x10}) [ 1286.960909][T23154] /dev/loop0: Can't open blockdev [ 1286.992887][T23158] /dev/loop0: Can't open blockdev 11:04:34 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:34 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xfdfd}}) 11:04:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x11}) [ 1287.114107][T23163] XFS (loop3): Invalid superblock magic number [ 1287.161450][T23177] /dev/loop0: Can't open blockdev 11:04:34 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x8}) [ 1287.234495][T23181] /dev/loop0: Can't open blockdev 11:04:35 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xd400000000000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:35 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x12}) 11:04:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xffe7}}) 11:04:35 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:35 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x9}) 11:04:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x48, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/583], &(0x7f0000000340)='syzkaller\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x8000000}, 0x10}, 0x75) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) write$P9_RMKNOD(r1, &(0x7f00000000c0)={0x14, 0x13, 0x1, {0x0, 0x1, 0x3}}, 0x14) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000040)=0x1) [ 1287.812577][T23207] /dev/loop0: Can't open blockdev 11:04:35 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xa}) 11:04:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x1000000}}) 11:04:35 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x14}) [ 1287.845625][T23213] /dev/loop0: Can't open blockdev 11:04:35 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) close(r1) socket$inet6_sctp(0xa, 0x10000000005, 0x84) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) sendmmsg$inet_sctp(r2, &(0x7f0000003940)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x10}}, 0x1c, &(0x7f0000001380)=[{&(0x7f0000000100)="ba", 0x1}], 0x1, &(0x7f0000001480)=ANY=[@ANYBLOB="180080000000000084000000050000003000000000000000"], 0x18, 0x40081}], 0x1, 0x40) 11:04:35 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1287.912759][T23211] XFS (loop3): Invalid superblock magic number 11:04:35 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xb}) [ 1288.049479][T23234] /dev/loop0: Can't open blockdev [ 1288.068530][T23237] /dev/loop0: Can't open blockdev [ 1288.289079][T23211] XFS (loop3): Invalid superblock magic number 11:04:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xd500000000000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:36 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1e}) 11:04:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x2000000}}) 11:04:36 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) sendto(r1, &(0x7f0000000200), 0x40900, 0x0, 0x0, 0x0) 11:04:36 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xc}) 11:04:36 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xd}) 11:04:36 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x25}) [ 1288.601318][T23259] /dev/loop0: Can't open blockdev 11:04:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x3000000}}) [ 1288.656571][T23264] /dev/loop0: Can't open blockdev 11:04:36 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x4000000}}) 11:04:36 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe}) [ 1288.767643][T23265] XFS (loop3): Invalid superblock magic number [ 1288.878559][T23290] /dev/loop0: Can't open blockdev [ 1288.918703][T23292] /dev/loop0: Can't open blockdev [ 1289.208472][T23265] XFS (loop3): Invalid superblock magic number 11:04:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xd600000000000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:37 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5c}) 11:04:37 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = accept4$packet(0xffffffffffffffff, &(0x7f0000001380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000013c0)=0x14, 0x800) setsockopt$packet_int(r1, 0x107, 0x14, &(0x7f0000001400), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x78}]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xd8, r2, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xa4c6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffd}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x8010}, 0x20000000) 11:04:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x5000000}}) 11:04:37 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x10}) 11:04:37 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1289.556320][T23314] /dev/loop0: Can't open blockdev 11:04:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000100)={0x7fffffff, 0x2, 0x9, 0xc830}, 0x10) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000400)) syz_read_part_table(0x2000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000500000a00000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000300000000000000000000000055aa", 0x40, 0x1c0}]) 11:04:37 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x11}) 11:04:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x6000000}}) 11:04:37 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe7}) [ 1289.609788][T23318] /dev/loop0: Can't open blockdev 11:04:37 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:37 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x12}) [ 1289.781154][T23323] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1289.824836][T23323] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1289.847060][T23341] /dev/loop0: Can't open blockdev [ 1289.855181][T23343] /dev/loop0: Can't open blockdev [ 1289.856256][T23323] loop5: p1 < > p3 [ 1289.866332][T23325] XFS (loop3): Invalid superblock magic number [ 1290.247694][T23325] XFS (loop3): Invalid superblock magic number 11:04:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xd700000000000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:38 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x300}) 11:04:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x7000000}}) 11:04:38 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xc0', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:38 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x14}) 11:04:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000100)={0x7fffffff, 0x2, 0x9, 0xc830}, 0x10) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000400)) syz_read_part_table(0x2000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000500000a00000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000300000000000000000000000055aa", 0x40, 0x1c0}]) 11:04:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x8000000}}) 11:04:38 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x500}) 11:04:38 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1e}) 11:04:38 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:38 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x600}) [ 1290.711271][T23372] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1290.751908][T23372] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1290.791460][T23372] loop5: p1 < > p3 11:04:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x9000000}}) [ 1290.829921][T23382] XFS (loop3): Invalid superblock magic number [ 1290.897715][T23400] /dev/loop0: Can't open blockdev [ 1290.954422][T23404] /dev/loop0: Can't open blockdev [ 1291.172817][T23382] XFS (loop3): Invalid superblock magic number 11:04:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xe401000000000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:39 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x25}) 11:04:39 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x700}) 11:04:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xa000000}}) 11:04:39 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x04', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000100)={0x7fffffff, 0x2, 0x9, 0xc830}, 0x10) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000400)) syz_read_part_table(0x2000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000500000a00000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000300000000000000000000000055aa", 0x40, 0x1c0}]) 11:04:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xb000000}}) 11:04:39 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5c}) 11:04:39 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x900}) 11:04:39 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:39 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xa00}) [ 1291.647989][T23428] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 1291.661857][T23428] ldm_validate_privheads(): Cannot find PRIVHEAD 1. 11:04:39 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe7}) [ 1291.688337][T23437] XFS (loop3): Invalid superblock magic number [ 1291.700931][T23428] loop5: p1 < > p3 [ 1291.724978][T23456] /dev/loop0: Can't open blockdev [ 1291.765619][T23459] /dev/loop0: Can't open blockdev [ 1292.110295][T23437] XFS (loop3): Invalid superblock magic number 11:04:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xe803000000000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xc000000}}) 11:04:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xb00}) 11:04:40 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:40 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x300}) 11:04:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000100)={0x7fffffff, 0x2, 0x9, 0xc830}, 0x10) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000400)) syz_read_part_table(0x2000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="02000500000a00000000ff07000000000000000000000000000000000000000000004200000000000000018000000000000300000000000000000000000055aa", 0x40, 0x1c0}]) 11:04:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xd000000}}) [ 1292.451758][T23489] /dev/loop0: Can't open blockdev 11:04:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xc00}) 11:04:40 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x500}) [ 1292.492170][T23495] /dev/loop0: Can't open blockdev 11:04:40 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1292.567329][T23485] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. 11:04:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xd00}) [ 1292.632357][T23492] XFS (loop3): Invalid superblock magic number [ 1292.633660][T23485] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 1292.671216][T23511] /dev/loop0: Can't open blockdev 11:04:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xe000000}}) [ 1292.692812][T23485] loop5: p1 < > p3 [ 1292.700373][T23515] /dev/loop0: Can't open blockdev 11:04:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xebffffff00000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:40 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x600}) 11:04:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe00}) 11:04:40 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x01', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x10000000}}) 11:04:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00001a7fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080)={0x4}, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x29}, 0x4}], 0x3c) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000000)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r4, 0x2}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r5, 0x20, 0xffffffff, 0x1}, &(0x7f0000000140)=0x10) sendto$inet6(r0, &(0x7f0000aaff09)="b8", 0x15202, 0x0, &(0x7f0000ab0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 11:04:40 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x700}) 11:04:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x11000000}}) 11:04:41 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1100}) 11:04:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x39}]}, &(0x7f0000000140)='G\xc3$\x05ju\xc3PL\x00\x94\xf7\x1a#\x85x\xa2Br{HS\x00\xd8\x1fl\xfd\vk\xbf\x83\x16m\xca\x0e\xa6\xe2#\x9a\xe5\xc0\x9d\xde\xf2\x01\x00\x00\x00\x00\x00\x00\x00c(\xf2}\x1d', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="58000000000000001401000008000000001b000000000000999901000000000000000000000059429e6737711a060000000000000000000000000000000000f91400"/75], 0x4b}, 0x0) fstatfs(r0, &(0x7f0000000180)=""/165) [ 1293.359522][T23548] XFS (loop3): Invalid superblock magic number 11:04:41 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x900}) [ 1293.502680][T23569] /dev/loop0: Can't open blockdev [ 1293.531469][T23576] /dev/loop0: Can't open blockdev [ 1293.762225][T23548] XFS (loop3): Invalid superblock magic number 11:04:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:41 executing program 5: write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000000400)={&(0x7f0000000340), 0xc, 0x0}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000200)={r2, 0x22}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r4, &(0x7f0000000700)=ANY=[@ANYBLOB="f075ce45c900b832126e15194cf5d912e2249d01df96b39609df12dbcd30c43f1507b156dba6ceb11905e5e5dccc59c3f886e0ddfb3e8b7aee0c929af4147654b304b4b446872bcb2f24cb38ee62361b9f9cb70298fd3cd09cda2fd8f0499e0df2df4dbfe0dfdce0a136efe7332ca8f24fc37f2dc07842e8a0f86e41da580a08d52c83dc20a19a41b2134b88ac4c83a245ab6f5d0108ad2feb5279cc7eac60f766f7adae"], 0x16) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') creat(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$security_smack_transmute(&(0x7f0000000280)='./bus\x00', &(0x7f00000004c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) fanotify_init(0x0, 0x0) mount(&(0x7f0000000100)=ANY=[], 0x0, 0x0, 0x0, &(0x7f0000000300)='\'\x00') r5 = fanotify_init(0x200, 0x0) fanotify_mark(r5, 0x1, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000440)=@in={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x4000) fanotify_mark(0xffffffffffffffff, 0x105, 0x1b, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@empty, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000006c0)=0xe8) quotactl(0xf404, 0x0, r6, &(0x7f0000000700)) ioctl$VIDIOC_G_AUDIO(0xffffffffffffffff, 0x80345621, &(0x7f0000000480)) sendfile(r4, r4, &(0x7f00000001c0), 0x8080fffffffe) 11:04:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x12000000}}) 11:04:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1200}) 11:04:41 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:41 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xa00}) 11:04:41 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xb00}) 11:04:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x14000000}}) [ 1294.134309][T23594] /dev/loop0: Can't open blockdev 11:04:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1400}) [ 1294.223257][T23612] /dev/loop0: Can't open blockdev 11:04:42 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xc00}) 11:04:42 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1294.309867][T23605] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) [ 1294.313037][T23601] XFS (loop3): Invalid superblock magic number 11:04:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x1e000000}}) [ 1294.371363][T23605] FAT-fs (loop5): Filesystem has been set read-only [ 1294.405385][T23605] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000500) [ 1294.433819][T23626] /dev/loop0: Can't open blockdev [ 1294.463098][T23630] /dev/loop0: Can't open blockdev 11:04:42 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1e00}) 11:04:42 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xd00}) 11:04:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x25000000}}) 11:04:42 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:42 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) r2 = accept$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x89}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 11:04:42 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe00}) 11:04:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x2500}) 11:04:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x3f000000}}) [ 1295.107469][T23654] /dev/loop0: Can't open blockdev [ 1295.193044][T23668] /dev/loop0: Can't open blockdev 11:04:42 executing program 5: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="640000001901050200000000000000001d010900500012001b9da4bc43c5011d6db2601b694183bf5b6f62569193773dc6b70331e108000000", @ANYRES32=0x0, @ANYBLOB="2400000035d5b8d8a6afbe4a1393f4b54284fde392d16d242e5df57f6196fdb4599528fa000000"], 0x64}}, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket(0x0, 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/96, 0x60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0xfffffefe, 0x2, 0x0, 0xfffffffffffffd4e) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x5, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r5, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r5, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x6, 0x2, 0x800, 0x2, 0x711}, &(0x7f0000000040)=0x14) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000000c0)={r6, 0x6}, &(0x7f00000001c0)=0x8) migrate_pages(0x0, 0x0, 0x0, 0x0) r7 = getpid() migrate_pages(r7, 0x0, 0x0, 0x0) getpgrp(r7) sched_getparam(0x0, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) [ 1295.232974][T23658] XFS (loop3): Invalid superblock magic number 11:04:43 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:43 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1100}) [ 1295.441525][T23684] /dev/loop0: Can't open blockdev [ 1295.457730][T23687] /dev/loop0: Can't open blockdev 11:04:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xff0f000000000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x40000000}}) 11:04:43 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x3f00}) 11:04:43 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1200}) 11:04:43 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:43 executing program 5: r0 = msgget$private(0x0, 0x0) msgctl$MSG_STAT(r0, 0xb, &(0x7f00000001c0)=""/87) r1 = getuid() r2 = getpgrp(0x0) lstat(&(0x7f0000000240)='.\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffd000/0x2000)=nil) shmat(r4, &(0x7f0000ffd000/0x3000)=nil, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r5, 0x227a, &(0x7f00000002c0)) fstat(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r6, 0x0, 0x0) r7 = timerfd_create(0x0, 0x0) fstat(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r8, 0x0, 0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000440)={{0x5, 0x0, r6, r3, r8, 0x0, 0x2}, 0x0, 0x400, 0x101, 0x1000000, r2, 0x0, 0x3}) r9 = getpgrp(0x0) lstat(&(0x7f0000000240)='.\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r11 = shmget$private(0x0, 0x2000, 0x1, &(0x7f0000ffd000/0x2000)=nil) shmat(r11, &(0x7f0000ffd000/0x3000)=nil, 0x0) r12 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$FIBMAP(r12, 0x227a, &(0x7f00000002c0)) fstat(r12, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r13, 0x0, 0x0) r14 = timerfd_create(0x0, 0x0) r15 = socket$rds(0x15, 0x5, 0x0) bind$rds(r15, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r15, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) socket$tipc(0x1e, 0x5, 0x0) fstat(r14, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r16, 0x0, 0x0) shmctl$IPC_SET(r11, 0x1, &(0x7f0000000300)={{0x5, 0x0, r13, r10, r16, 0x0, 0x2}, 0x0, 0x400, 0x101, 0x1000000, r9, 0x0, 0x3}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)={0x0, 0x0}) msgctl$IPC_SET(r0, 0x1, &(0x7f00000001c0)={{0x3f, r1, r6, 0x0, r13, 0x60, 0x6f}, 0x0, 0x7f, 0x9, 0x10000, 0x3, 0xee61, r17, r18}) r19 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r19, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2e0000002300817ee45de087185082cf0400b0eb0c0018000aac0f000bac0f005b3f00009148790000f85acc7c45", 0x2e}], 0x1}, 0x0) 11:04:43 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1400}) 11:04:43 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x4000}) [ 1295.890525][T23704] __nla_validate_parse: 5 callbacks suppressed [ 1295.890533][T23704] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1295.906271][T23708] /dev/loop0: Can't open blockdev [ 1295.918938][T23710] /dev/loop0: Can't open blockdev 11:04:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x5c000000}}) 11:04:43 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:43 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4400, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/mixer\x00', 0x10f000, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x3000) syz_init_net_socket$rose(0xb, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socket(0x0, 0x0, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f00000001c0)=@known='trusted.overlay.redirect\x00', &(0x7f0000000200)=""/96, 0x60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000080)=0x5, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) r5 = getpid() migrate_pages(r5, 0x0, 0x0, 0x0) r6 = getpgrp(r5) sched_getparam(r6, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000cab000)=0xffffffffffffff18) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r10, r7, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f00000002c0)={0x7, 0x1}) setresuid(0x0, r10, 0x0) lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "cb0e4f74787ce47b7e2922678c9f97cd"}, 0x11, 0x3) [ 1296.086938][T23715] XFS (loop3): Invalid superblock magic number [ 1296.130814][T23735] /dev/loop0: Can't open blockdev 11:04:43 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1e00}) [ 1296.160286][T23737] /dev/loop0: Can't open blockdev [ 1296.465248][T23715] XFS (loop3): Invalid superblock magic number 11:04:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffdffff00000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5c00}) 11:04:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xe7ffffff}}) 11:04:44 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:44 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x2500}) [ 1296.752260][T23763] /dev/loop0: Can't open blockdev 11:04:44 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x4000}) 11:04:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe7ff}) [ 1296.786436][T23769] /dev/loop0: Can't open blockdev 11:04:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xfdfdffff}}) 11:04:44 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1296.858793][T23770] XFS (loop3): Invalid superblock magic number 11:04:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xfdfd}) [ 1296.980462][T23784] /dev/loop0: Can't open blockdev 11:04:44 executing program 5: openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$packet(0x11, 0x4000000000002, 0x300) open(0x0, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xa4, 0x0, 0x0, 0x8000000000000}, 0x0, &(0x7f00000004c0)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000240)={'nat\x00'}, &(0x7f00000002c0)=0x78) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) 11:04:44 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5c00}) [ 1297.024669][T23791] /dev/loop0: Can't open blockdev [ 1297.141716][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.147589][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.153486][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.159418][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.220281][T23770] XFS (loop3): Invalid superblock magic number [ 1297.221718][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.232384][ C1] protocol 88fb is buggy, dev hsr_slave_1 11:04:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xfffffdfd}}) 11:04:45 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xffe7}) 11:04:45 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe7ff}) 11:04:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1000000}) 11:04:45 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xfdfd}) [ 1297.582058][T23916] /dev/loop0: Can't open blockdev 11:04:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xffffffe7}}) [ 1297.626718][T23928] /dev/loop0: Can't open blockdev [ 1297.650051][T23920] XFS (loop3): Invalid superblock magic number 11:04:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x2000000}) 11:04:45 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1297.781735][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.826772][T23942] /dev/loop0: Can't open blockdev [ 1297.839016][T23943] /dev/loop0: Can't open blockdev 11:04:45 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) 11:04:45 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xffe7}) 11:04:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xffffffff}}) 11:04:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x3000000}) 11:04:45 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:45 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1000000}) 11:04:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:04:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x4000000}) 11:04:45 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x2000000}) [ 1298.271161][T23967] /dev/loop0: Can't open blockdev [ 1298.310036][T23979] /dev/loop0: Can't open blockdev [ 1298.315857][T23970] XFS (loop3): Invalid superblock magic number 11:04:46 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:46 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x3000000}) [ 1298.451475][T23988] /dev/loop0: Can't open blockdev [ 1298.459999][T23989] /dev/loop0: Can't open blockdev 11:04:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) fallocate(r2, 0x0, 0x0, 0x2000402) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r0, &(0x7f0000000380)=""/4096, 0x20001380) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000000c0)=""/38) 11:04:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x2}}) 11:04:46 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5000000}) 11:04:46 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:46 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x4000000}) 11:04:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:46 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5000000}) 11:04:46 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x6000000}) 11:04:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x3}}) [ 1299.123414][T24018] /dev/loop0: Can't open blockdev [ 1299.171527][T24016] XFS (loop3): Invalid superblock magic number [ 1299.178483][T24029] /dev/loop0: Can't open blockdev 11:04:46 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:46 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x7000000}) 11:04:46 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x6000000}) [ 1299.352264][T24041] /dev/loop0: Can't open blockdev [ 1299.399251][T24044] /dev/loop0: Can't open blockdev 11:04:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) fallocate(r2, 0x0, 0x0, 0x2000402) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r0, &(0x7f0000000380)=""/4096, 0x20001380) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000000c0)=""/38) 11:04:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x4}}) 11:04:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x8000000}) 11:04:47 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x7000000}) 11:04:47 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1299.651047][T24057] /dev/loop0: Can't open blockdev [ 1299.727439][T24063] /dev/loop0: Can't open blockdev 11:04:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:47 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x8000000}) 11:04:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x9000000}) 11:04:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x5}}) 11:04:47 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:47 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x9000000}) 11:04:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xa000000}) [ 1299.960248][T24077] /dev/loop0: Can't open blockdev [ 1300.029557][T24085] /dev/loop0: Can't open blockdev 11:04:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) fallocate(r2, 0x0, 0x0, 0x2000402) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$alg(r0, &(0x7f0000000380)=""/4096, 0x20001380) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000000c0)=""/38) 11:04:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x6}}) 11:04:47 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:47 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xa000000}) 11:04:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xb000000}) 11:04:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x7}}) 11:04:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:47 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xb000000}) [ 1300.276298][T24094] /dev/loop0: Can't open blockdev 11:04:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xc000000}) [ 1300.351234][T24108] /dev/loop0: Can't open blockdev 11:04:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x8}}) 11:04:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:04:48 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:48 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xc000000}) 11:04:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xd000000}) 11:04:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x9}}) 11:04:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xa}}) 11:04:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1300.708747][T24131] /dev/loop0: Can't open blockdev [ 1300.724425][T24134] /dev/loop0: Can't open blockdev 11:04:48 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xd000000}) 11:04:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe000000}) 11:04:48 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81000) syz_genetlink_get_family_id$team(0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) bind(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f00000003c0)) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040)=0x200084, 0xffffffffffffff8e) r1 = dup(0xffffffffffffffff) write$FUSE_NOTIFY_RETRIEVE(r1, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x40, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x80, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000100), 0x10) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000c40), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000c80)=@can, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) socket(0x0, 0x2, 0x4) bind$xdp(r3, &(0x7f0000000100), 0x10) socket(0x100000000011, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) write(r0, &(0x7f0000000000), 0x300000) 11:04:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xb}}) 11:04:48 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x10000000}) 11:04:48 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe000000}) [ 1301.016435][T24158] /dev/loop0: Can't open blockdev 11:04:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xc}}) 11:04:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1301.054106][T24165] /dev/loop0: Can't open blockdev 11:04:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x11000000}) 11:04:48 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:48 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x10000000}) [ 1301.265409][T24180] /dev/loop0: Can't open blockdev [ 1301.297470][T24188] /dev/loop0: Can't open blockdev 11:04:49 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) 11:04:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xd}}) 11:04:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x12000000}) 11:04:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xb, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:49 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:49 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x11000000}) 11:04:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x14000000}) 11:04:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xe}}) [ 1301.487894][T24203] /dev/loop0: Can't open blockdev 11:04:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) fallocate(r2, 0x0, 0x0, 0x2000402) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) getpid() connect$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$alg(r0, &(0x7f0000000380)=""/4096, 0x20001380) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000000c0)=""/38) [ 1301.518937][T24206] /dev/loop0: Can't open blockdev 11:04:49 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x12000000}) 11:04:49 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1e000000}) 11:04:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x10}}) 11:04:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:49 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x14000000}) [ 1301.797109][T24225] /dev/loop0: Can't open blockdev 11:04:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x25000000}) 11:04:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x11}}) [ 1301.838040][T24234] /dev/loop0: Can't open blockdev 11:04:49 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1e000000}) 11:04:49 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1301.960651][ T26] audit: type=1800 audit(1574593489.657:140): pid=24216 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.5" name="hugetlb.2MB.e_in_bytes" dev="sda1" ino=18580 res=0 11:04:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x12}}) 11:04:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:49 executing program 5: [ 1302.038020][ T26] audit: type=1800 audit(1574593489.687:141): pid=24222 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.5" name="hugetlb.2MB.e_in_bytes" dev="sda1" ino=18580 res=0 [ 1302.044088][T24249] /dev/loop0: Can't open blockdev [ 1302.077745][T24250] /dev/loop0: Can't open blockdev 11:04:49 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:49 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x25000000}) 11:04:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x3f000000}) 11:04:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x14}}) 11:04:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x11, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1302.296189][T24270] /dev/loop0: Can't open blockdev 11:04:50 executing program 5: 11:04:50 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x40000000}) 11:04:50 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x40000000}) [ 1302.320464][T24272] /dev/loop0: Can't open blockdev 11:04:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x12, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:50 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:50 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x1e}}) 11:04:50 executing program 5: 11:04:50 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5c000000}) 11:04:50 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5c000000}) 11:04:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x25, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1302.564198][T24287] /dev/loop0: Can't open blockdev 11:04:50 executing program 5: 11:04:50 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x25}}) [ 1302.595047][T24294] /dev/loop0: Can't open blockdev 11:04:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2c, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:50 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xff', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:50 executing program 5: 11:04:50 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe7ffffff}) 11:04:50 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe7ffffff}) 11:04:50 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x5c}}) 11:04:50 executing program 5: 11:04:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:50 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xfdfdffff}) 11:04:50 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xfdfdffff}) 11:04:50 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:50 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xfffffdfd}) [ 1303.017796][T24332] /dev/loop0: Can't open blockdev 11:04:50 executing program 5: 11:04:50 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xfffffdfd}) [ 1303.040289][T24336] /dev/loop0: Can't open blockdev 11:04:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:50 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xe7}}) 11:04:50 executing program 5: 11:04:50 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xff', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:50 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xffffffe7}) 11:04:50 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xffffffe7}) 11:04:50 executing program 5: 11:04:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5c, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x300}}) 11:04:51 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xff', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xffffffff}) 11:04:51 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xffffffff}) 11:04:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x60, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x500}}) 11:04:51 executing program 5: 11:04:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:04:51 executing program 5: 11:04:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x64, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:51 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:04:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x2]}) 11:04:51 executing program 5: 11:04:51 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xff', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x600}}) 11:04:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:51 executing program 5: 11:04:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x3]}) 11:04:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x700}}) 11:04:51 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x2]}) 11:04:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:51 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xff', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:51 executing program 5: 11:04:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x900}}) 11:04:51 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x3]}) 11:04:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:51 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x4]}) 11:04:51 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xf9', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xa00}}) 11:04:51 executing program 5: 11:04:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x4]}) 11:04:52 executing program 5: 11:04:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xb00}}) 11:04:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5]}) 11:04:52 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5]}) 11:04:52 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x7f', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:52 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x6]}) 11:04:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xc4, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:52 executing program 5: 11:04:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xc00}}) 11:04:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x6]}) 11:04:52 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x7]}) 11:04:52 executing program 5: 11:04:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x7]}) 11:04:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd4, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xd00}}) 11:04:52 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 11:04:52 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x8c', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x8]}) 11:04:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd5, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xe00}}) 11:04:52 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x8]}) 11:04:52 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x9]}) 11:04:52 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xeb', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:52 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xa]}) 11:04:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(0x0, 0xa4ee1d972127837a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40d09) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) write$cgroup_int(r3, &(0x7f00000000c0)=0x4, 0x12) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x1100}}) 11:04:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x9]}) 11:04:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd6, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xb]}) 11:04:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd7, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:53 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xf6', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xa]}) 11:04:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x1200}}) 11:04:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xc]}) 11:04:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x10a, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(0x0, 0xa4ee1d972127837a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40d09) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) write$cgroup_int(r3, &(0x7f00000000c0)=0x4, 0x12) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x1400}}) 11:04:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xb]}) 11:04:53 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xfe', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xd]}) 11:04:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xc]}) 11:04:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x164, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x1e00}}) 11:04:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1e4, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe]}) 11:04:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xd]}) 11:04:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x2500}}) 11:04:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(0x0, 0xa4ee1d972127837a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40d09) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) write$cgroup_int(r3, &(0x7f00000000c0)=0x4, 0x12) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:53 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x254, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x10]}) 11:04:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe]}) 11:04:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x3f00}}) [ 1306.103746][T24617] /dev/loop0: Can't open blockdev [ 1306.130343][T24623] /dev/loop0: Can't open blockdev 11:04:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x11]}) 11:04:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x10]}) 11:04:53 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x328, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(0x0, 0xa4ee1d972127837a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40d09) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) write$cgroup_int(r3, &(0x7f00000000c0)=0x4, 0x12) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x4000}}) 11:04:54 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x11]}) 11:04:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x12]}) [ 1306.354048][T24642] /dev/loop0: Can't open blockdev 11:04:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x329, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1306.408286][T24650] /dev/loop0: Can't open blockdev 11:04:54 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x12]}) 11:04:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(0x0, 0xa4ee1d972127837a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40d09) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80802, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:54 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x5c00}}) 11:04:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x14]}) 11:04:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x32a, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:54 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x14]}) [ 1306.629230][T24667] /dev/loop0: Can't open blockdev 11:04:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1e]}) 11:04:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xe7ff}}) [ 1306.693652][T24678] /dev/loop0: Can't open blockdev 11:04:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x32b, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:54 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:54 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1e]}) 11:04:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(0x0, 0xa4ee1d972127837a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40d09) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX=r2, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xfdfd}}) 11:04:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x25]}) 11:04:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x34f, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1306.908604][T24696] /dev/loop0: Can't open blockdev 11:04:54 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x25]}) 11:04:54 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(0x0, 0xa4ee1d972127837a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40d09) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x35e, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5c]}) 11:04:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xffe7}}) 11:04:54 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5c]}) [ 1307.119903][T24717] /dev/loop0: Can't open blockdev [ 1307.165757][T24725] /dev/loop0: Can't open blockdev 11:04:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe7]}) 11:04:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x1000000}}) 11:04:54 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3e8, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:55 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe7]}) 11:04:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(0x0, 0xa4ee1d972127837a) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x2000000}}) 11:04:55 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1307.371046][T24744] /dev/loop0: Can't open blockdev [ 1307.384724][T24746] /dev/loop0: Can't open blockdev 11:04:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x300]}) 11:04:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:55 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x300]}) [ 1307.472976][T24753] /dev/loop0: Can't open blockdev 11:04:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x500]}) 11:04:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7d4060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee334e224d0f712c3c9bdef8e6a7908ea11e11fccf485b08b7c7f9acc5b231bfabf01366031760737e13af5fb376dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027969e1654ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bc0ffffff6d6654b423a1b8352d8f58178a9e67a28c9f17efebdbebf1f90a96d966864239d7c295c85b3f8c3432fcf515a9269563840c63c3856ece8d760012ff8e68e76d5549465335720c803d38edbe2a26c341f16696349887974cc25d4d45eac15d9ce0b4ef468bb39e441297819ef210dba879a59a81b7729dd01aad819766beb6b549f1ca1283a354ddc5502e7d4bb83878efe07cfccad2f9a574b45d0a9e6872cb5e164f3182380000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1307.552559][T24762] /dev/loop0: Can't open blockdev 11:04:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x3000000}}) 11:04:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:55 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x600]}) 11:04:55 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x500]}) 11:04:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x4000000}}) [ 1307.768647][T24782] /dev/loop0: Can't open blockdev 11:04:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x700]}) 11:04:55 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x600]}) [ 1307.855163][T24790] /dev/loop0: Can't open blockdev 11:04:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:55 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x900]}) 11:04:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x5000000}}) 11:04:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1308.045187][T24809] /dev/loop0: Can't open blockdev 11:04:55 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x700]}) 11:04:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1308.080471][T24814] /dev/loop0: Can't open blockdev 11:04:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xa00]}) 11:04:55 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x6000000}}) 11:04:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa01, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xb00]}) 11:04:56 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x900]}) 11:04:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1308.326177][T24834] /dev/loop0: Can't open blockdev 11:04:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1308.373434][T24843] /dev/loop0: Can't open blockdev 11:04:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x7000000}}) 11:04:56 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xc00]}) 11:04:56 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:56 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xa00]}) 11:04:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1308.546620][T24859] /dev/loop0: Can't open blockdev 11:04:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7d4060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee334e224d0f712c3c9bdef8e6a7908ea11e11fccf485b08b7c7f9acc5b231bfabf01366031760737e13af5fb376dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027969e1654ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bc0ffffff6d6654b423a1b8352d8f58178a9e67a28c9f17efebdbebf1f90a96d966864239d7c295c85b3f8c3432fcf515a9269563840c63c3856ece8d760012ff8e68e76d5549465335720c803d38edbe2a26c341f16696349887974cc25d4d45eac15d9ce0b4ef468bb39e441297819ef210dba879a59a81b7729dd01aad819766beb6b549f1ca1283a354ddc5502e7d4bb83878efe07cfccad2f9a574b45d0a9e6872cb5e164f3182380000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x8000000}}) 11:04:56 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xd00]}) [ 1308.616385][T24863] /dev/loop0: Can't open blockdev 11:04:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:56 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:56 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xb00]}) 11:04:56 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe00]}) 11:04:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x9000000}}) [ 1308.813586][T24884] /dev/loop0: Can't open blockdev 11:04:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:56 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xc00]}) [ 1308.842360][T24889] /dev/loop0: Can't open blockdev 11:04:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xa000000}}) 11:04:56 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:56 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1100]}) 11:04:56 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xd00]}) 11:04:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xb000000}}) [ 1309.045180][T24907] /dev/loop0: Can't open blockdev 11:04:56 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1200]}) [ 1309.113297][T24914] /dev/loop0: Can't open blockdev 11:04:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:56 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:56 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe00]}) 11:04:56 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1100, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xc000000}}) 11:04:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1400]}) [ 1309.320493][T24932] /dev/loop0: Can't open blockdev 11:04:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xd000000}}) [ 1309.376840][T24940] /dev/loop0: Can't open blockdev 11:04:57 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1100]}) 11:04:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:57 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7d4060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee334e224d0f712c3c9bdef8e6a7908ea11e11fccf485b08b7c7f9acc5b231bfabf01366031760737e13af5fb376dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027969e1654ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bc0ffffff6d6654b423a1b8352d8f58178a9e67a28c9f17efebdbebf1f90a96d966864239d7c295c85b3f8c3432fcf515a9269563840c63c3856ece8d760012ff8e68e76d5549465335720c803d38edbe2a26c341f16696349887974cc25d4d45eac15d9ce0b4ef468bb39e441297819ef210dba879a59a81b7729dd01aad819766beb6b549f1ca1283a354ddc5502e7d4bb83878efe07cfccad2f9a574b45d0a9e6872cb5e164f3182380000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1e00]}) 11:04:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xe000000}}) 11:04:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:57 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1200]}) [ 1309.627316][T24960] /dev/loop0: Can't open blockdev 11:04:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x2500]}) 11:04:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x10000000}}) [ 1309.678405][T24969] /dev/loop0: Can't open blockdev 11:04:57 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1400]}) 11:04:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) socket$inet_icmp_raw(0x2, 0x3, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:57 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x3f00]}) 11:04:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x11000000}}) 11:04:57 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1e00]}) [ 1309.911129][T24991] /dev/loop0: Can't open blockdev 11:04:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2500, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x12000000}}) 11:04:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x4000]}) [ 1309.953794][T24994] /dev/loop0: Can't open blockdev 11:04:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2803, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:57 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:57 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x2500]}) 11:04:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5c00]}) 11:04:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x14000000}}) [ 1310.189165][T25013] /dev/loop0: Can't open blockdev 11:04:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2903, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1310.234452][T25022] /dev/loop0: Can't open blockdev 11:04:57 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x4000]}) 11:04:58 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x1e000000}}) 11:04:58 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe7ff]}) 11:04:58 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5c00]}) 11:04:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2a03, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:58 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x25000000}}) 11:04:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xfdfd]}) [ 1310.500807][T25046] /dev/loop0: Can't open blockdev [ 1310.540845][T25054] /dev/loop0: Can't open blockdev 11:04:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2b03, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:58 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe7ff]}) 11:04:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:58 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x3f000000}}) 11:04:58 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\xff', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xffe7]}) 11:04:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1000000]}) 11:04:58 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xfdfd]}) 11:04:58 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x40000000}}) 11:04:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2c00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x2000000]}) 11:04:58 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x3000000]}) 11:04:58 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xffe7]}) [ 1310.989151][T25093] /dev/loop0: Can't open blockdev [ 1311.007768][T25096] /dev/loop0: Can't open blockdev 11:04:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:58 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x5c000000}}) 11:04:58 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x4000000]}) 11:04:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:58 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1000000]}) [ 1311.227052][T25113] /dev/loop0: Can't open blockdev 11:04:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5000000]}) 11:04:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xe7ffffff}}) 11:04:59 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x2000000]}) 11:04:59 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x6000000]}) 11:04:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xfdfdffff}}) 11:04:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7d4060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee334e224d0f712c3c9bdef8e6a7908ea11e11fccf485b08b7c7f9acc5b231bfabf01366031760737e13af5fb376dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027969e1654ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bc0ffffff6d6654b423a1b8352d8f58178a9e67a28c9f17efebdbebf1f90a96d966864239d7c295c85b3f8c3432fcf515a9269563840c63c3856ece8d760012ff8e68e76d5549465335720c803d38edbe2a26c341f16696349887974cc25d4d45eac15d9ce0b4ef468bb39e441297819ef210dba879a59a81b7729dd01aad819766beb6b549f1ca1283a354ddc5502e7d4bb83878efe07cfccad2f9a574b45d0a9e6872cb5e164f3182380000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) getpid() socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1311.510590][T25136] /dev/loop0: Can't open blockdev 11:04:59 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x3000000]}) [ 1311.557123][T25142] /dev/loop0: Can't open blockdev 11:04:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x7000000]}) 11:04:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xfffffdfd}}) 11:04:59 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:59 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x4000000]}) 11:04:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4f03, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x8000000]}) 11:04:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:04:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5402, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1311.829640][T25166] /dev/loop0: Can't open blockdev 11:04:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xffffffe7}}) [ 1311.874746][T25171] /dev/loop0: Can't open blockdev 11:04:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5c00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:04:59 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:59 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5000000]}) 11:04:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x9000000]}) 11:04:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xffffffff}}) 11:04:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1312.075661][T25190] /dev/loop0: Can't open blockdev 11:04:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5e03, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1312.114984][T25195] /dev/loop0: Can't open blockdev 11:04:59 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:04:59 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x6000000]}) 11:04:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:04:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xa000000]}) 11:05:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1312.285466][T25210] /dev/loop0: Can't open blockdev [ 1312.336724][T25216] /dev/loop0: Can't open blockdev 11:05:00 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xb000000]}) 11:05:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x2}) 11:05:00 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:00 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x7000000]}) 11:05:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6400, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x3}) 11:05:00 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xc000000]}) [ 1312.555986][T25235] /dev/loop0: Can't open blockdev 11:05:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1312.606693][T25245] /dev/loop0: Can't open blockdev 11:05:00 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x8000000]}) 11:05:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6401, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x4}) 11:05:00 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xd000000]}) 11:05:00 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:00 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x9000000]}) [ 1312.844522][T25266] /dev/loop0: Can't open blockdev 11:05:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5}) 11:05:00 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe000000]}) 11:05:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1312.905103][T25273] /dev/loop0: Can't open blockdev 11:05:00 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xa000000]}) 11:05:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:00 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:00 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x10000000]}) 11:05:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x6}) 11:05:00 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xb000000]}) [ 1313.104402][T25285] /dev/loop0: Can't open blockdev 11:05:00 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x11000000]}) 11:05:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1313.178004][T25299] /dev/loop0: Can't open blockdev 11:05:00 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:00 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xc400, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:01 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xc000000]}) 11:05:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x7}) [ 1313.386045][T25314] /dev/loop0: Can't open blockdev 11:05:01 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x12000000]}) 11:05:01 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xd000000]}) 11:05:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x8}) [ 1313.455558][T25325] /dev/loop0: Can't open blockdev 11:05:01 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd400, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:01 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:01 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x14000000]}) 11:05:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x9}) 11:05:01 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe000000]}) 11:05:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd500, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:01 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1e000000]}) [ 1313.753558][T25354] /dev/loop0: Can't open blockdev 11:05:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xa}) 11:05:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd600, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:01 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x10000000]}) [ 1313.795669][T25354] /dev/loop0: Can't open blockdev 11:05:01 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:01 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:01 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x25000000]}) 11:05:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd700, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:01 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x11000000]}) 11:05:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xb}) [ 1314.038593][T25379] /dev/loop0: Can't open blockdev 11:05:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xe401, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:01 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1314.095148][T25388] /dev/loop0: Can't open blockdev 11:05:01 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x3f000000]}) 11:05:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xc}) 11:05:01 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:01 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x12000000]}) 11:05:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x40000000]}) 11:05:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xe803, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:02 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1314.303149][T25406] /dev/loop0: Can't open blockdev [ 1314.343765][T25413] /dev/loop0: Can't open blockdev 11:05:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xd}) 11:05:02 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x14000000]}) 11:05:02 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:02 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5c000000]}) 11:05:02 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1e000000]}) 11:05:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe}) 11:05:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xff0f, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1314.571491][T25433] /dev/loop0: Can't open blockdev [ 1314.636154][T25443] /dev/loop0: Can't open blockdev 11:05:02 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x25000000]}) 11:05:02 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe7ffffff]}) 11:05:02 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x10}) 11:05:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x30000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1314.871238][T25461] /dev/loop0: Can't open blockdev 11:05:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xfdfdffff]}) 11:05:02 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x40000000]}) 11:05:02 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1314.936924][T25468] /dev/loop0: Can't open blockdev 11:05:02 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x11}) 11:05:02 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5c000000]}) 11:05:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xfffffdfd]}) 11:05:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4a721, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1315.156366][T25486] /dev/loop0: Can't open blockdev 11:05:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x12}) 11:05:02 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:02 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:02 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe7ffffff]}) 11:05:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xffffffe7]}) 11:05:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x14}) 11:05:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa0000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1315.358388][T25509] /dev/loop0: Can't open blockdev [ 1315.395775][T25515] /dev/loop0: Can't open blockdev 11:05:03 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xfdfdffff]}) 11:05:03 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xffffffff]}) 11:05:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x800000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1e}) 11:05:03 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:03 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1315.578309][T25532] /dev/loop0: Can't open blockdev 11:05:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xfffffdfd]}) 11:05:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x989680, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x25}) 11:05:03 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:03 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x2]}) 11:05:03 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xcdfdff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1315.807745][T25554] /dev/loop0: Can't open blockdev 11:05:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xffffffe7]}) [ 1315.849217][T25562] /dev/loop0: Can't open blockdev 11:05:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5c}) 11:05:03 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x3]}) 11:05:03 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:03 executing program 5: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) 11:05:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xffffffff]}) 11:05:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe7}) 11:05:03 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x4]}) 11:05:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000100, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1316.095006][T25582] /dev/loop0: Can't open blockdev 11:05:03 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5]}) 11:05:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1316.169066][T25591] /dev/loop0: Can't open blockdev 11:05:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x12cffff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:03 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x300}) 11:05:04 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x2]}) 11:05:04 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x6]}) 11:05:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:04 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1316.462818][T25614] /dev/loop0: Can't open blockdev 11:05:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x500}) 11:05:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x22cffff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1316.482989][T25624] /dev/loop0: Can't open blockdev 11:05:04 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:04 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x3]}) 11:05:04 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:04 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x4]}) 11:05:04 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x7]}) 11:05:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x600}) 11:05:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x32cffff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1316.732372][T25645] /dev/loop0: Can't open blockdev 11:05:04 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5]}) 11:05:04 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:04 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x8]}) [ 1316.797164][T25654] /dev/loop0: Can't open blockdev 11:05:04 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x700}) 11:05:04 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:04 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x6]}) 11:05:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:04 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x9]}) 11:05:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x900}) 11:05:04 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x7]}) [ 1317.077440][T25678] /dev/loop0: Can't open blockdev [ 1317.105913][T25684] /dev/loop0: Can't open blockdev 11:05:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:04 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x0f', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:04 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xa]}) 11:05:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xa00}) 11:05:05 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x8]}) 11:05:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:05 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xb]}) 11:05:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xb00}) 11:05:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x2, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:05 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:05 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x9]}) 11:05:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:05 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:05 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xc]}) 11:05:05 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xa]}) 11:05:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x72cffff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xc00}) 11:05:05 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1317.607849][T25725] /dev/loop0: Can't open blockdev [ 1317.651275][T25735] /dev/loop0: Can't open blockdev 11:05:05 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x3, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xd00}) 11:05:05 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:05 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xb]}) 11:05:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:05 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x9) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1317.894106][T25759] /dev/loop0: Can't open blockdev 11:05:05 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xd]}) 11:05:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe00}) 11:05:05 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xc]}) 11:05:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:05 executing program 5: r0 = getpid() tkill(r0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:05 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe]}) 11:05:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1100}) 11:05:05 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xd]}) 11:05:05 executing program 5: r0 = getpid() tkill(r0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1318.206780][T25787] /dev/loop0: Can't open blockdev 11:05:06 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x5, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:06 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe]}) 11:05:06 executing program 5: r0 = getpid() tkill(r0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:06 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x10]}) 11:05:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa010000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:06 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x6, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1318.405219][T25805] /dev/loop0: Can't open blockdev [ 1318.417885][T25806] /dev/loop0: Can't open blockdev 11:05:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1200}) 11:05:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1400}) 11:05:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:06 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:06 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x10]}) 11:05:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1318.639122][T25824] /dev/loop0: Can't open blockdev 11:05:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1e00}) [ 1318.699174][T25835] /dev/loop0: Can't open blockdev 11:05:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:06 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x11]}) 11:05:06 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:06 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x7, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:06 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x11]}) 11:05:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x2500}) 11:05:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x3f00}) 11:05:06 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:06 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x12]}) 11:05:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xe000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1318.947989][T25856] /dev/loop0: Can't open blockdev [ 1318.957947][T25858] /dev/loop0: Can't open blockdev 11:05:06 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x8, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:06 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x12]}) 11:05:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x4000}) 11:05:06 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x14]}) 11:05:06 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x14]}) [ 1319.214887][T25879] /dev/loop0: Can't open blockdev 11:05:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x11000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1e]}) [ 1319.265257][T25885] /dev/loop0: Can't open blockdev 11:05:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5c00}) 11:05:07 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1e]}) 11:05:07 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x9, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:07 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x25]}) 11:05:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x12000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x25]}) 11:05:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe7ff}) 11:05:07 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5c]}) [ 1319.517017][T25901] /dev/loop0: Can't open blockdev [ 1319.530485][T25907] /dev/loop0: Can't open blockdev 11:05:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5c]}) 11:05:07 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xa, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xfdfd}) 11:05:07 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe7]}) [ 1319.714060][T25921] /dev/loop0: Can't open blockdev 11:05:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe7]}) [ 1319.740205][T25927] /dev/loop0: Can't open blockdev 11:05:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xffe7}) 11:05:07 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xb, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:07 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x300]}) 11:05:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x300]}) 11:05:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1000000}) 11:05:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x21a70400, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1319.897391][T25938] /dev/loop0: Can't open blockdev 11:05:07 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x500]}) [ 1319.949977][T25949] /dev/loop0: Can't open blockdev 11:05:07 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xc, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:07 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(0x0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x500]}) 11:05:07 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(0x0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x2000000}) 11:05:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x25000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1320.079277][T25959] /dev/loop0: Can't open blockdev 11:05:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x600]}) 11:05:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x3000000}) 11:05:07 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x600]}) 11:05:07 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(0x0, 0x9) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1320.137838][T25970] /dev/loop0: Can't open blockdev 11:05:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x28030000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x700]}) 11:05:08 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xd, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:08 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x0) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:08 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x700]}) 11:05:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x4000000}) 11:05:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x900]}) 11:05:08 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x0) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:08 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x900]}) 11:05:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x29030000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5000000}) [ 1320.399767][T26001] /dev/loop0: Can't open blockdev 11:05:08 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x0) move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1320.475160][T26013] /dev/loop0: Can't open blockdev 11:05:08 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xa00]}) 11:05:08 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xe, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:08 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xa00]}) 11:05:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2a030000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x6000000}) 11:05:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xb00]}) 11:05:08 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:08 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xb00]}) 11:05:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2b030000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1320.677394][T26035] /dev/loop0: Can't open blockdev 11:05:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x7000000}) 11:05:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xc00]}) [ 1320.760315][T26049] /dev/loop0: Can't open blockdev 11:05:08 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xc00]}) 11:05:08 executing program 5: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() tkill(r0, 0x9) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:08 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x10, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x8000000}) 11:05:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xd00]}) 11:05:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2c000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:08 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000300)={0x100000011, @loopback, 0x0, 0x0, 'lblc\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x15000000000000, 0x485, 0x7fffffff0004, 0x0) 11:05:08 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xd00]}) 11:05:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x9000000}) 11:05:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe00]}) [ 1321.001430][T26072] /dev/loop0: Can't open blockdev 11:05:08 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe00]}) [ 1321.071319][T26083] /dev/loop0: Can't open blockdev 11:05:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xa000000}) 11:05:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1100]}) 11:05:08 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x11, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:08 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1100]}) 11:05:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xb000000}) 11:05:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1321.266260][T26097] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00b128fd9a devid 0 transid 0 /dev/loop5 11:05:09 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1200]}) 11:05:09 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1200]}) [ 1321.338936][T26107] /dev/loop0: Can't open blockdev [ 1321.390623][T26113] /dev/loop0: Can't open blockdev 11:05:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xc000000}) 11:05:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x42534658, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:09 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1400]}) 11:05:09 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1400]}) 11:05:09 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x12, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1321.536991][T26130] /dev/loop0: Can't open blockdev [ 1321.550583][T26131] /dev/loop0: Can't open blockdev 11:05:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xd000000}) 11:05:09 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1e00]}) 11:05:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:09 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x25, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:09 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1e00]}) 11:05:09 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x2500]}) 11:05:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe000000}) 11:05:09 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x48, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4f030000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:09 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x3f00]}) 11:05:09 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x2500]}) 11:05:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x54020000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x10000000}) [ 1321.878115][T26166] /dev/loop0: Can't open blockdev [ 1321.953046][T26171] /dev/loop0: Can't open blockdev 11:05:09 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x4000]}) 11:05:09 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x4000]}) 11:05:09 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4c, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x11000000}) 11:05:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x58465342, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:09 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5c00]}) [ 1322.050086][T26183] /dev/loop0: Can't open blockdev [ 1322.062254][T26186] /dev/loop0: Can't open blockdev 11:05:09 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x5c, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:09 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5c00]}) 11:05:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x12000000}) [ 1322.228081][T26203] /dev/loop0: Can't open blockdev [ 1322.260279][T26210] /dev/loop0: Can't open blockdev 11:05:10 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe7ff]}) 11:05:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5e030000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x60, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:10 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe7ff]}) 11:05:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x14000000}) 11:05:10 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:10 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xfdfd]}) 11:05:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:10 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xfdfd]}) 11:05:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x1e000000}) 11:05:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x68, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:10 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xffe7]}) 11:05:10 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xffe7]}) 11:05:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x64000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x25000000}) 11:05:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x6c, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:10 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:10 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1000000]}) 11:05:10 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1000000]}) 11:05:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x3f000000}) 11:05:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x64010000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x74, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:10 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x2000000]}) 11:05:10 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:10 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x2000000]}) 11:05:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x40000000}) 11:05:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x7a, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:10 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x3000000]}) 11:05:10 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x3000000]}) 11:05:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x5c000000}) 11:05:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x300, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:10 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x4000000]}) 11:05:10 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x4000000]}) 11:05:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xe7ffffff}) [ 1323.335074][T26319] /dev/loop0: Can't open blockdev 11:05:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:11 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5000000]}) 11:05:11 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5000000]}) [ 1323.383615][T26329] /dev/loop0: Can't open blockdev 11:05:11 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x500, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xfdfdffff}) 11:05:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1323.484461][T26339] /dev/loop0: Can't open blockdev 11:05:11 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x6000000]}) 11:05:11 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x6000000]}) 11:05:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1323.532425][T26343] /dev/loop0: Can't open blockdev 11:05:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xfffffdfd}) 11:05:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x80969800, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:11 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x600, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:11 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x7000000]}) 11:05:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:11 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x7000000]}) 11:05:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xffffffe7}) 11:05:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:11 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x8000000]}) [ 1323.811993][T26368] /dev/loop0: Can't open blockdev [ 1323.825760][T26375] /dev/loop0: Can't open blockdev 11:05:11 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x8000000]}) 11:05:11 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x700, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0xffffffff}) 11:05:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:11 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x9000000]}) 11:05:11 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x9000000]}) [ 1324.013462][T26391] /dev/loop0: Can't open blockdev 11:05:11 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xa000000]}) 11:05:11 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x900, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1324.033719][T26396] /dev/loop0: Can't open blockdev 11:05:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xc4000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1324.203582][T26412] /dev/loop0: Can't open blockdev 11:05:11 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xa000000]}) 11:05:11 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xb000000]}) [ 1324.239924][T26421] /dev/loop0: Can't open blockdev 11:05:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:05:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x2]}) 11:05:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd4000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:12 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xa00, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:12 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xc000000]}) 11:05:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd5000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 11:05:12 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xb000000]}) [ 1324.459676][T26442] /dev/loop0: Can't open blockdev 11:05:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x3]}) [ 1324.538961][T26451] /dev/loop0: Can't open blockdev 11:05:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd6000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:12 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xd000000]}) 11:05:12 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xc000000]}) 11:05:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 11:05:12 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xb00, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:12 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xd000000]}) 11:05:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x4]}) 11:05:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd7000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:12 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe000000]}) [ 1324.766562][T26472] /dev/loop0: Can't open blockdev [ 1324.780744][T26475] /dev/loop0: Can't open blockdev 11:05:12 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x10000000]}) 11:05:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) 11:05:12 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xc00, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xe4010000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:12 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe000000]}) 11:05:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5]}) 11:05:12 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x11000000]}) [ 1324.975826][T26496] /dev/loop0: Can't open blockdev [ 1324.986640][T26497] /dev/loop0: Can't open blockdev 11:05:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xe8030000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:12 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x10000000]}) 11:05:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 11:05:12 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x12000000]}) 11:05:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x6]}) 11:05:12 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xd00, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:12 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x11000000]}) 11:05:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 11:05:12 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x14000000]}) [ 1325.296229][T26524] /dev/loop0: Can't open blockdev 11:05:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x7]}) 11:05:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1325.342394][T26534] /dev/loop0: Can't open blockdev 11:05:13 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1e000000]}) 11:05:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xe00, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:13 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x12000000]}) 11:05:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 11:05:13 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x25000000]}) [ 1325.535465][T26552] /dev/loop0: Can't open blockdev 11:05:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x8]}) [ 1325.583056][T26556] /dev/loop0: Can't open blockdev 11:05:13 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x3f000000]}) 11:05:13 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x14000000]}) 11:05:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xff0f0000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x1020, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x9]}) 11:05:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0), 0x0, 0x10000}], 0x0, 0x0) 11:05:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffdcd00, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:13 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1e000000]}) 11:05:13 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x40000000]}) 11:05:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x1100, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffdffff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:13 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x25000000]}) 11:05:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xa]}) 11:05:13 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5c000000]}) 11:05:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0), 0x0, 0x10000}], 0x0, 0x0) 11:05:13 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x40000000]}) 11:05:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffff2c01, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x1200, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xb]}) 11:05:13 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe7ffffff]}) 11:05:13 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5c000000]}) 11:05:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffff2c02, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0), 0x0, 0x10000}], 0x0, 0x0) 11:05:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xc]}) 11:05:14 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xfdfdffff]}) 11:05:14 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x2000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffff2c03, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:14 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe7ffffff]}) 11:05:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 11:05:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xd]}) 11:05:14 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xfffffdfd]}) 11:05:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffff2c07, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:14 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x2010, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:14 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xfdfdffff]}) 11:05:14 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xffffffe7]}) 11:05:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe]}) 11:05:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 11:05:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:14 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xfffffdfd]}) 11:05:14 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x2500, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffdff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x10]}) 11:05:14 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xffffffff]}) 11:05:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 11:05:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:14 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x3f00, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:14 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xffffffe7]}) 11:05:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x11]}) 11:05:14 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:05:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:14 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xffffffff]}) 11:05:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x12]}) 11:05:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 11:05:14 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:14 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:05:14 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x2]}) 11:05:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x14]}) [ 1327.288277][T26731] /dev/loop0: Can't open blockdev 11:05:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) [ 1327.369581][T26742] /dev/loop0: Can't open blockdev 11:05:15 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x2]}) 11:05:15 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4800, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1e]}) 11:05:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x3]}) 11:05:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 11:05:15 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x3]}) [ 1327.531540][T26753] /dev/loop0: Can't open blockdev 11:05:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x25]}) [ 1327.573746][T26762] /dev/loop0: Can't open blockdev 11:05:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd1ac88e634, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:15 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4c00, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:15 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x4]}) 11:05:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x4]}) 11:05:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5c]}) 11:05:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000", 0x3f, 0x10000}], 0x0, 0x0) [ 1327.803641][T26780] /dev/loop0: Can't open blockdev 11:05:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5]}) 11:05:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:15 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5]}) [ 1327.840743][T26787] /dev/loop0: Can't open blockdev 11:05:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe7]}) 11:05:15 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x5c00, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:15 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x6]}) 11:05:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000", 0x3f, 0x10000}], 0x0, 0x0) 11:05:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x6]}) 11:05:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x300]}) 11:05:15 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x6000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:15 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x7]}) 11:05:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000", 0x3f, 0x10000}], 0x0, 0x0) 11:05:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x7]}) 11:05:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x500]}) 11:05:16 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x8]}) 11:05:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x6800, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x6c00, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:16 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x9]}) 11:05:16 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x8]}) 11:05:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x600]}) 11:05:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f424852", 0x44, 0x10000}], 0x0, 0x0) 11:05:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x80000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:16 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x9]}) 11:05:16 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xa]}) 11:05:16 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xb]}) 11:05:16 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xa]}) 11:05:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x700]}) 11:05:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xcdfdff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x7400, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f424852", 0x44, 0x10000}], 0x0, 0x0) 11:05:16 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xb]}) 11:05:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x900]}) 11:05:16 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xc]}) 11:05:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x7a00, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:16 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xc]}) 11:05:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xa00]}) 11:05:16 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xd]}) 11:05:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f424852", 0x44, 0x10000}], 0x0, 0x0) 11:05:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xedc0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x100010000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:16 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe]}) 11:05:16 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xd]}) 11:05:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xb00]}) 11:05:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 11:05:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x12cffff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:17 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x1000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:17 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x10]}) 11:05:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x22cffff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xc00]}) 11:05:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe]}) 11:05:17 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x11]}) [ 1329.507659][T27046] /dev/loop0: Can't open blockdev 11:05:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 11:05:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x10]}) 11:05:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1329.589979][T27066] /dev/loop0: Can't open blockdev 11:05:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xd00]}) 11:05:17 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x12]}) 11:05:17 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x1002004, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x11]}) 11:05:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 11:05:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe00]}) 11:05:17 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x14]}) 11:05:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x32cffff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:17 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x2000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x12]}) 11:05:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 11:05:17 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1e]}) [ 1329.944726][T27103] /dev/loop0: Can't open blockdev 11:05:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1100]}) 11:05:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1330.019494][T27109] /dev/loop0: Can't open blockdev 11:05:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x14]}) 11:05:17 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x3000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 11:05:17 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x25]}) 11:05:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1e]}) [ 1330.206171][T27126] /dev/loop0: Can't open blockdev [ 1330.263419][T27136] /dev/loop0: Can't open blockdev 11:05:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:18 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1200]}) 11:05:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 11:05:18 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5c]}) 11:05:18 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x25]}) 11:05:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1400]}) 11:05:18 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe7]}) [ 1330.463228][T27156] /dev/loop0: Can't open blockdev 11:05:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1330.495463][T27158] /dev/loop0: Can't open blockdev 11:05:18 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5c]}) 11:05:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48}], 0x0, 0x0) 11:05:18 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4200001, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:18 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x300]}) 11:05:18 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe7]}) 11:05:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x72cffff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1e00]}) 11:05:18 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x500]}) 11:05:18 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x300]}) [ 1330.767596][T27180] /dev/loop0: Can't open blockdev 11:05:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 1330.823783][T27193] /dev/loop0: Can't open blockdev 11:05:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x2500]}) 11:05:18 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x500]}) 11:05:18 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x600]}) 11:05:18 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x5000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:18 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x600]}) 11:05:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48}], 0x0, 0x0) 11:05:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x3f00]}) 11:05:18 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x700]}) [ 1331.104709][T27209] /dev/loop0: Can't open blockdev 11:05:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1331.150828][T27215] /dev/loop0: Can't open blockdev 11:05:18 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x700]}) 11:05:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x4000]}) 11:05:19 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x6000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:19 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x900]}) 11:05:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xa01000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:19 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5c00]}) [ 1331.418317][T27245] /dev/loop0: Can't open blockdev 11:05:19 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x900]}) 11:05:19 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xa00]}) 11:05:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1331.481957][T27253] /dev/loop0: Can't open blockdev 11:05:19 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe7ff]}) 11:05:19 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x7000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:19 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xa00]}) 11:05:19 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xb00]}) 11:05:19 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xfdfd]}) [ 1331.692540][T27269] /dev/loop0: Can't open blockdev [ 1331.728301][T27275] /dev/loop0: Can't open blockdev 11:05:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:19 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xc00]}) 11:05:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:19 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x8000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:19 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xb00]}) 11:05:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:19 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xd00]}) [ 1331.899853][T27291] /dev/loop0: Can't open blockdev [ 1331.936767][T27298] /dev/loop0: Can't open blockdev 11:05:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000001703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7d4060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000bf6255177a2259861bb9bee334e224d0f712c3c9bdef8e6a7908ea11e11fccf485b08b7c7f9acc5b231bfabf01366031760737e13af5fb376dc737a173b95edd45248fd50ec0e13a1f43c677b6aba16ab79027969e1654ac2cb0d5ff8b0c0c26b3f495e6f3b388ae886e99a31827d82b6f2cea7eb9a5b59bc0ffffff6d6654b423a1b8352d8f58178a9e67a28c9f17efebdbebf1f90a96d966864239d7c295c85b3f8c3432fcf515a9269563840c63c3856ece8d760012ff8e68e76d5549465335720c803d38edbe2a26c341f16696349887974cc25d4d45eac15d9ce0b4ef468bb39e441297819ef210dba879a59a81b7729dd01aad819766beb6b549f1ca1283a354ddc5502e7d4bb83878efe07cfccad2f9a574b45d0a9e6872cb5e164f3182380000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:19 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xffe7]}) 11:05:19 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xc00]}) 11:05:19 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe00]}) 11:05:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:19 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xd00]}) 11:05:19 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x9000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:19 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1000000]}) 11:05:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:19 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1100]}) 11:05:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(0x0, 0xa4ee1d972127837a) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) [ 1332.214254][T27324] /dev/loop0: Can't open blockdev 11:05:19 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe00]}) 11:05:20 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x2000000]}) [ 1332.262512][T27329] /dev/loop0: Can't open blockdev 11:05:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:20 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xa000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:20 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1100]}) 11:05:20 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1200]}) [ 1332.395598][T27343] /dev/loop0: Can't open blockdev [ 1332.408471][T27344] /dev/loop0: Can't open blockdev 11:05:20 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x3000000]}) 11:05:20 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xb000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000200)) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(0xffffffffffffffff, &(0x7f0000931ff4)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x4, 0x0, 0x0, {0xa, 0x0, 0x3c, @local}}}, 0x80) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) syz_extract_tcp_res$synack(&(0x7f0000000180), 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) creat(0x0, 0xa4ee1d972127837a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40d09) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="66643d6ab3f59c5b930cdd91900b4028d35e7c2b5c1912b6e1abf5e048b2cfbd0cfce67de8ab64cebf5b8e34474b960e2f5577e47e36b4485ddc52044459cd8805e4a781647381f7090d69773cc04af40a49e6dc0038d31b0bab71a15ceaeddb76a7ca889b", @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0062010000009a69683eba1cfa6a241fbf"]) 11:05:20 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1200]}) [ 1332.556853][T27354] /dev/loop0: Can't open blockdev 11:05:20 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1400]}) [ 1332.593150][T27363] /dev/loop0: Can't open blockdev 11:05:20 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x4000000]}) 11:05:20 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xc000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:20 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1400]}) 11:05:20 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1e00]}) 11:05:20 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:20 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5000000]}) [ 1332.793096][T27380] /dev/loop0: Can't open blockdev 11:05:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1332.834027][T27388] /dev/loop0: Can't open blockdev [ 1332.848533][T27390] FAULT_INJECTION: forcing a failure. [ 1332.848533][T27390] name failslab, interval 1, probability 0, space 0, times 0 11:05:20 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x6000000]}) [ 1332.922350][T27390] CPU: 1 PID: 27390 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1332.931144][T27390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1332.941287][T27390] Call Trace: [ 1332.944582][T27390] dump_stack+0x1fb/0x318 [ 1332.948960][T27390] should_fail+0x555/0x770 [ 1332.953383][T27390] __should_failslab+0x11a/0x160 [ 1332.958317][T27390] ? __se_sys_memfd_create+0x10a/0x4b0 [ 1332.963780][T27390] should_failslab+0x9/0x20 [ 1332.968281][T27390] __kmalloc+0x7a/0x340 [ 1332.968300][T27390] __se_sys_memfd_create+0x10a/0x4b0 [ 1332.968314][T27390] ? do_syscall_64+0x1d/0x1c0 [ 1332.968327][T27390] __x64_sys_memfd_create+0x5b/0x70 [ 1332.968336][T27390] do_syscall_64+0xf7/0x1c0 [ 1332.968354][T27390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1332.977752][T27390] RIP: 0033:0x45a639 [ 1332.977763][T27390] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:05:20 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x2500]}) 11:05:20 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x7000000]}) 11:05:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x21a7040000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:20 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xd000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:20 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1e00]}) [ 1332.977769][T27390] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1332.977779][T27390] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 000000000045a639 [ 1332.977785][T27390] RDX: 0000000020000268 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 1332.977791][T27390] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1332.977797][T27390] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1d3e7446d4 [ 1332.977802][T27390] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:20 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:20 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x2500]}) [ 1333.104309][T27402] /dev/loop0: Can't open blockdev [ 1333.123825][T27410] /dev/loop0: Can't open blockdev 11:05:20 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x4000]}) 11:05:20 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x8000000]}) 11:05:20 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:20 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xe000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1333.160750][T27412] FAULT_INJECTION: forcing a failure. [ 1333.160750][T27412] name failslab, interval 1, probability 0, space 0, times 0 [ 1333.260022][T27412] CPU: 0 PID: 27412 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1333.268736][T27412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1333.278798][T27412] Call Trace: [ 1333.282097][T27412] dump_stack+0x1fb/0x318 [ 1333.286443][T27412] should_fail+0x555/0x770 [ 1333.290870][T27412] __should_failslab+0x11a/0x160 [ 1333.295815][T27412] ? shmem_alloc_inode+0x1b/0x40 [ 1333.300753][T27412] should_failslab+0x9/0x20 [ 1333.305259][T27412] kmem_cache_alloc+0x56/0x2e0 11:05:21 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5c00]}) 11:05:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2803000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:21 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x9000000]}) [ 1333.310026][T27412] ? shmem_match+0x180/0x180 [ 1333.314618][T27412] shmem_alloc_inode+0x1b/0x40 [ 1333.319383][T27412] ? shmem_match+0x180/0x180 [ 1333.323982][T27412] new_inode_pseudo+0x68/0x240 [ 1333.328879][T27412] new_inode+0x28/0x1c0 [ 1333.333046][T27412] shmem_get_inode+0x108/0x6e0 [ 1333.337828][T27412] __shmem_file_setup+0x129/0x280 [ 1333.342879][T27412] shmem_file_setup+0x2f/0x40 [ 1333.347573][T27412] __se_sys_memfd_create+0x28e/0x4b0 [ 1333.350603][T27426] /dev/loop0: Can't open blockdev [ 1333.352859][T27412] ? do_syscall_64+0x1d/0x1c0 [ 1333.352880][T27412] __x64_sys_memfd_create+0x5b/0x70 [ 1333.352890][T27412] do_syscall_64+0xf7/0x1c0 [ 1333.352904][T27412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1333.352913][T27412] RIP: 0033:0x45a639 [ 1333.352923][T27412] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1333.352928][T27412] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:05:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x3f00]}) 11:05:21 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe7ff]}) [ 1333.352937][T27412] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 000000000045a639 [ 1333.352943][T27412] RDX: 0000000020000268 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 1333.352947][T27412] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1333.352952][T27412] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1d3e7446d4 [ 1333.352957][T27412] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2903000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1333.476489][T27436] /dev/loop0: Can't open blockdev 11:05:21 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x4000]}) 11:05:21 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xa000000]}) 11:05:21 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x10000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2a03000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:21 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xfdfd]}) [ 1333.656900][T27450] /dev/loop0: Can't open blockdev 11:05:21 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xb000000]}) [ 1333.708031][T27458] /dev/loop0: Can't open blockdev 11:05:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5c00]}) [ 1333.728821][T27459] FAULT_INJECTION: forcing a failure. [ 1333.728821][T27459] name failslab, interval 1, probability 0, space 0, times 0 11:05:21 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x11000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:21 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xffe7]}) [ 1333.769510][T27459] CPU: 1 PID: 27459 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1333.778223][T27459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1333.788285][T27459] Call Trace: [ 1333.791577][T27459] dump_stack+0x1fb/0x318 [ 1333.795911][T27459] should_fail+0x555/0x770 [ 1333.800327][T27459] __should_failslab+0x11a/0x160 [ 1333.805272][T27459] ? security_inode_alloc+0x36/0x1e0 [ 1333.810561][T27459] should_failslab+0x9/0x20 [ 1333.815068][T27459] kmem_cache_alloc+0x56/0x2e0 [ 1333.819837][T27459] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1333.825547][T27459] security_inode_alloc+0x36/0x1e0 [ 1333.825560][T27459] inode_init_always+0x3b5/0x920 [ 1333.825570][T27459] ? shmem_match+0x180/0x180 [ 1333.825579][T27459] new_inode_pseudo+0x7f/0x240 [ 1333.825589][T27459] new_inode+0x28/0x1c0 [ 1333.825602][T27459] shmem_get_inode+0x108/0x6e0 [ 1333.825617][T27459] __shmem_file_setup+0x129/0x280 [ 1333.858877][T27459] shmem_file_setup+0x2f/0x40 [ 1333.864864][T27459] __se_sys_memfd_create+0x28e/0x4b0 11:05:21 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1000000]}) [ 1333.870154][T27459] ? do_syscall_64+0x1d/0x1c0 [ 1333.874839][T27459] __x64_sys_memfd_create+0x5b/0x70 [ 1333.880578][T27459] do_syscall_64+0xf7/0x1c0 [ 1333.885079][T27459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1333.885089][T27459] RIP: 0033:0x45a639 [ 1333.885099][T27459] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:05:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2b03000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1333.885108][T27459] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1333.914621][T27459] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 000000000045a639 [ 1333.914628][T27459] RDX: 0000000020000268 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 1333.914633][T27459] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1333.914639][T27459] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1d3e7446d4 [ 1333.914645][T27459] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1333.937303][T27470] /dev/loop0: Can't open blockdev [ 1333.983323][T27472] /dev/loop0: Can't open blockdev 11:05:21 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:21 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xc000000]}) 11:05:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe7ff]}) 11:05:21 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x2000000]}) 11:05:21 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x12000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2c00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:21 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xfdfd]}) 11:05:21 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xd000000]}) [ 1334.106611][T27484] FAULT_INJECTION: forcing a failure. [ 1334.106611][T27484] name failslab, interval 1, probability 0, space 0, times 0 [ 1334.172256][T27487] /dev/loop0: Can't open blockdev 11:05:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x34e688acd1000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1334.200515][T27484] CPU: 1 PID: 27484 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1334.209243][T27484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1334.219301][T27484] Call Trace: [ 1334.222579][T27484] dump_stack+0x1fb/0x318 [ 1334.227034][T27484] should_fail+0x555/0x770 [ 1334.231797][T27484] __should_failslab+0x11a/0x160 [ 1334.236736][T27484] ? __d_alloc+0x2d/0x6e0 [ 1334.241069][T27484] should_failslab+0x9/0x20 [ 1334.245577][T27484] kmem_cache_alloc+0x56/0x2e0 11:05:21 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x3000000]}) 11:05:21 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1334.250345][T27484] __d_alloc+0x2d/0x6e0 [ 1334.254506][T27484] ? lockdep_init_map+0x2a/0x680 [ 1334.259461][T27484] d_alloc_pseudo+0x1d/0x70 [ 1334.263988][T27484] alloc_file_pseudo+0xc3/0x260 [ 1334.268849][T27484] __shmem_file_setup+0x1a2/0x280 [ 1334.273878][T27484] shmem_file_setup+0x2f/0x40 [ 1334.278571][T27484] __se_sys_memfd_create+0x28e/0x4b0 [ 1334.283873][T27484] ? do_syscall_64+0x1d/0x1c0 [ 1334.288570][T27484] __x64_sys_memfd_create+0x5b/0x70 [ 1334.294386][T27484] do_syscall_64+0xf7/0x1c0 [ 1334.298993][T27484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1334.299003][T27484] RIP: 0033:0x45a639 [ 1334.299015][T27484] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1334.328365][T27484] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1334.328377][T27484] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 000000000045a639 11:05:22 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe000000]}) [ 1334.328382][T27484] RDX: 0000000020000268 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 1334.328388][T27484] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1334.328393][T27484] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1d3e7446d4 [ 1334.328399][T27484] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:22 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:22 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x4000000]}) 11:05:22 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x20000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:22 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x10000000]}) 11:05:22 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xffe7]}) 11:05:22 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1334.534847][T27613] /dev/loop0: Can't open blockdev [ 1334.558079][T27621] /dev/loop0: Can't open blockdev [ 1334.578204][T27622] FAULT_INJECTION: forcing a failure. [ 1334.578204][T27622] name failslab, interval 1, probability 0, space 0, times 0 11:05:22 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1000000]}) 11:05:22 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x11000000]}) 11:05:22 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5000000]}) [ 1334.603361][T27622] CPU: 1 PID: 27622 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1334.612078][T27622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1334.622495][T27622] Call Trace: [ 1334.625791][T27622] dump_stack+0x1fb/0x318 [ 1334.630129][T27622] should_fail+0x555/0x770 [ 1334.634556][T27622] __should_failslab+0x11a/0x160 [ 1334.639500][T27622] ? __alloc_file+0x2c/0x390 [ 1334.644096][T27622] should_failslab+0x9/0x20 [ 1334.648616][T27622] kmem_cache_alloc+0x56/0x2e0 [ 1334.653403][T27622] __alloc_file+0x2c/0x390 11:05:22 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x6000000]}) 11:05:22 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x12000000]}) [ 1334.657925][T27622] alloc_empty_file+0xac/0x1b0 [ 1334.662696][T27622] alloc_file+0x60/0x4c0 [ 1334.666951][T27622] alloc_file_pseudo+0x1d4/0x260 [ 1334.671902][T27622] __shmem_file_setup+0x1a2/0x280 [ 1334.676929][T27622] shmem_file_setup+0x2f/0x40 [ 1334.681606][T27622] __se_sys_memfd_create+0x28e/0x4b0 [ 1334.686896][T27622] ? do_syscall_64+0x1d/0x1c0 [ 1334.691579][T27622] __x64_sys_memfd_create+0x5b/0x70 [ 1334.696784][T27622] do_syscall_64+0xf7/0x1c0 [ 1334.701299][T27622] entry_SYSCALL_64_after_hwframe+0x49/0xbe 11:05:22 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x7000000]}) [ 1334.707296][T27622] RIP: 0033:0x45a639 [ 1334.711202][T27622] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1334.730989][T27622] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1334.739481][T27622] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 000000000045a639 [ 1334.747460][T27622] RDX: 0000000020000268 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 1334.755444][T27622] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1334.764205][T27622] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1d3e7446d4 [ 1334.772267][T27622] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:22 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:22 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x14000000]}) 11:05:22 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x8000000]}) 11:05:22 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4253465800000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:22 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x20100000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:22 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x2000000]}) 11:05:22 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:22 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x1e000000]}) 11:05:22 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x25000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:22 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x9000000]}) 11:05:22 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x3000000]}) 11:05:22 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x3f000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1335.061425][T27661] /dev/loop0: Can't open blockdev [ 1335.077946][T27665] /dev/loop0: Can't open blockdev [ 1335.128008][T27668] FAULT_INJECTION: forcing a failure. [ 1335.128008][T27668] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.176211][T27668] CPU: 1 PID: 27668 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1335.184926][T27668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.184931][T27668] Call Trace: [ 1335.184951][T27668] dump_stack+0x1fb/0x318 [ 1335.184968][T27668] should_fail+0x555/0x770 [ 1335.184985][T27668] __should_failslab+0x11a/0x160 [ 1335.185001][T27668] ? security_file_alloc+0x36/0x200 [ 1335.198341][T27668] should_failslab+0x9/0x20 [ 1335.198352][T27668] kmem_cache_alloc+0x56/0x2e0 [ 1335.198368][T27668] security_file_alloc+0x36/0x200 [ 1335.207100][T27668] __alloc_file+0xde/0x390 [ 1335.207113][T27668] alloc_empty_file+0xac/0x1b0 [ 1335.207123][T27668] alloc_file+0x60/0x4c0 [ 1335.207141][T27668] alloc_file_pseudo+0x1d4/0x260 [ 1335.217287][T27668] __shmem_file_setup+0x1a2/0x280 [ 1335.217306][T27668] shmem_file_setup+0x2f/0x40 [ 1335.243268][T27673] fuse: Bad value for 'fd' [ 1335.245038][T27668] __se_sys_memfd_create+0x28e/0x4b0 [ 1335.245049][T27668] ? do_syscall_64+0x1d/0x1c0 [ 1335.245062][T27668] __x64_sys_memfd_create+0x5b/0x70 [ 1335.254986][T27673] /dev/loop0: Can't open blockdev [ 1335.255012][T27668] do_syscall_64+0xf7/0x1c0 [ 1335.289286][T27668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1335.295202][T27668] RIP: 0033:0x45a639 [ 1335.299162][T27668] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1335.318770][T27668] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 11:05:23 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:23 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x25000000]}) 11:05:23 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xa000000]}) 11:05:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:23 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x4000000]}) 11:05:23 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1335.327162][T27668] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 000000000045a639 [ 1335.335252][T27668] RDX: 0000000020000268 RSI: 0000000000000000 RDI: 00000000004bf6d2 [ 1335.343311][T27668] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1335.351264][T27668] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f1d3e7446d4 [ 1335.359888][T27668] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:23 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5000000]}) 11:05:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x4f03000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:23 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xb000000]}) 11:05:23 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x3f000000]}) [ 1335.491023][T27687] /dev/loop0: Can't open blockdev [ 1335.506310][T27689] FAULT_INJECTION: forcing a failure. [ 1335.506310][T27689] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.532297][T27691] /dev/loop0: Can't open blockdev [ 1335.564400][T27689] CPU: 0 PID: 27689 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1335.573116][T27689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1335.584148][T27689] Call Trace: [ 1335.584183][T27689] dump_stack+0x1fb/0x318 [ 1335.584201][T27689] should_fail+0x555/0x770 [ 1335.584218][T27689] __should_failslab+0x11a/0x160 [ 1335.584233][T27689] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1335.584242][T27689] should_failslab+0x9/0x20 [ 1335.584249][T27689] __kmalloc+0x7a/0x340 [ 1335.584259][T27689] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1335.584272][T27689] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1335.584290][T27689] tomoyo_path_perm+0x192/0x850 [ 1335.584327][T27689] tomoyo_path_truncate+0x1c/0x20 [ 1335.584337][T27689] security_path_truncate+0xd5/0x150 [ 1335.584349][T27689] do_sys_ftruncate+0x493/0x710 [ 1335.584364][T27689] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1335.584378][T27689] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1335.601289][T27689] ? trace_irq_disable_rcuidle+0x23/0x1e0 11:05:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5402000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1335.601304][T27689] ? do_syscall_64+0x1d/0x1c0 [ 1335.601319][T27689] __x64_sys_ftruncate+0x60/0x70 [ 1335.601332][T27689] do_syscall_64+0xf7/0x1c0 [ 1335.668508][T27689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1335.677922][T27689] RIP: 0033:0x45a607 [ 1335.677933][T27689] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:05:23 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x48000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1335.677939][T27689] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1335.677949][T27689] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 000000000045a607 [ 1335.677955][T27689] RDX: 0000000020000268 RSI: 0000000000020000 RDI: 0000000000000004 [ 1335.677961][T27689] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1335.677969][T27689] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 1335.747760][T27689] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1335.810970][T27689] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1335.818288][T27705] /dev/loop0: Can't open blockdev [ 1335.837958][T27708] /dev/loop0: Can't open blockdev 11:05:23 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:23 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x6000000]}) 11:05:23 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xc000000]}) 11:05:23 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x40000000]}) 11:05:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5c00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:23 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4c000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1336.015435][T27719] /dev/loop0: Can't open blockdev [ 1336.039678][T27722] FAULT_INJECTION: forcing a failure. [ 1336.039678][T27722] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1336.053007][T27722] CPU: 0 PID: 27722 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1336.061675][T27722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1336.071736][T27722] Call Trace: [ 1336.075031][T27722] dump_stack+0x1fb/0x318 [ 1336.075767][T27723] /dev/loop0: Can't open blockdev [ 1336.079363][T27722] should_fail+0x555/0x770 [ 1336.088785][T27722] should_fail_alloc_page+0x55/0x60 [ 1336.093991][T27722] prepare_alloc_pages+0x283/0x460 [ 1336.099106][T27722] __alloc_pages_nodemask+0xb2/0x5d0 [ 1336.104415][T27722] kmem_getpages+0x4d/0xa00 [ 1336.104432][T27722] cache_grow_begin+0x7e/0x2c0 [ 1336.104450][T27722] cache_alloc_refill+0x311/0x3f0 [ 1336.104459][T27722] ? check_preemption_disabled+0xb7/0x2a0 [ 1336.104472][T27722] __kmalloc+0x318/0x340 [ 1336.104487][T27722] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1336.104499][T27722] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1336.104518][T27722] tomoyo_path_perm+0x192/0x850 [ 1336.104557][T27722] tomoyo_path_truncate+0x1c/0x20 [ 1336.149897][T27722] security_path_truncate+0xd5/0x150 [ 1336.149912][T27722] do_sys_ftruncate+0x493/0x710 [ 1336.149929][T27722] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1336.166395][T27722] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1336.171866][T27722] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1336.177592][T27722] ? do_syscall_64+0x1d/0x1c0 [ 1336.182278][T27722] __x64_sys_ftruncate+0x60/0x70 [ 1336.187216][T27722] do_syscall_64+0xf7/0x1c0 [ 1336.187236][T27722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1336.197786][T27722] RIP: 0033:0x45a607 [ 1336.201683][T27722] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1336.221431][T27722] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1336.229853][T27722] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 000000000045a607 11:05:23 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x5c000000]}) 11:05:23 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x5c000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:23 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5e03000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:23 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xd000000]}) 11:05:23 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x7000000]}) [ 1336.237922][T27722] RDX: 0000000020000268 RSI: 0000000000020000 RDI: 0000000000000004 [ 1336.245903][T27722] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1336.254402][T27722] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 1336.254409][T27722] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:24 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe000000]}) [ 1336.346450][T27733] /dev/loop0: Can't open blockdev [ 1336.389611][T27742] /dev/loop0: Can't open blockdev 11:05:24 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:24 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x8000000]}) 11:05:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xe7ffffff]}) 11:05:24 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x10000000]}) 11:05:24 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x60000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1336.534271][T27756] /dev/loop0: Can't open blockdev 11:05:24 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x9000000]}) 11:05:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6400000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:24 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x11000000]}) [ 1336.560160][T27759] FAULT_INJECTION: forcing a failure. [ 1336.560160][T27759] name failslab, interval 1, probability 0, space 0, times 0 11:05:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xfdfdffff]}) [ 1336.607024][T27761] /dev/loop0: Can't open blockdev [ 1336.660601][T27759] CPU: 0 PID: 27759 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1336.669411][T27759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1336.679474][T27759] Call Trace: [ 1336.682775][T27759] dump_stack+0x1fb/0x318 [ 1336.687117][T27759] should_fail+0x555/0x770 [ 1336.691548][T27759] __should_failslab+0x11a/0x160 [ 1336.696487][T27759] ? tomoyo_encode2+0x273/0x5a0 [ 1336.701337][T27759] should_failslab+0x9/0x20 [ 1336.705939][T27759] __kmalloc+0x7a/0x340 11:05:24 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x68000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xfffffdfd]}) [ 1336.710098][T27759] tomoyo_encode2+0x273/0x5a0 [ 1336.714774][T27759] ? dynamic_dname+0xf0/0xf0 [ 1336.719887][T27759] tomoyo_realpath_from_path+0x769/0x7c0 [ 1336.725533][T27759] tomoyo_path_perm+0x192/0x850 [ 1336.730423][T27759] tomoyo_path_truncate+0x1c/0x20 [ 1336.735450][T27759] security_path_truncate+0xd5/0x150 [ 1336.740737][T27759] do_sys_ftruncate+0x493/0x710 [ 1336.745595][T27759] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1336.751326][T27759] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1336.756873][T27759] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1336.762597][T27759] ? do_syscall_64+0x1d/0x1c0 [ 1336.767279][T27759] __x64_sys_ftruncate+0x60/0x70 [ 1336.772223][T27759] do_syscall_64+0xf7/0x1c0 [ 1336.772239][T27759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1336.772249][T27759] RIP: 0033:0x45a607 [ 1336.772258][T27759] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1336.772263][T27759] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1336.772271][T27759] RAX: ffffffffffffffda RBX: 0000000020000240 RCX: 000000000045a607 [ 1336.772276][T27759] RDX: 0000000020000268 RSI: 0000000000020000 RDI: 0000000000000004 [ 1336.772281][T27759] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1336.772286][T27759] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 1336.772291][T27759] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1336.804618][T27759] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1336.840832][T27775] /dev/loop0: Can't open blockdev [ 1336.881854][T27778] /dev/loop0: Can't open blockdev 11:05:24 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:24 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xa000000]}) 11:05:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6401000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:24 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x12000000]}) 11:05:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xffffffe7]}) 11:05:24 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x6c000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1337.028669][T27788] /dev/loop0: Can't open blockdev [ 1337.034827][T27795] FAULT_INJECTION: forcing a failure. [ 1337.034827][T27795] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.047932][T27795] CPU: 0 PID: 27795 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1337.056609][T27795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1337.066756][T27795] Call Trace: [ 1337.070055][T27795] dump_stack+0x1fb/0x318 [ 1337.074409][T27795] should_fail+0x555/0x770 11:05:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:24 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x14000000]}) [ 1337.078837][T27795] __should_failslab+0x11a/0x160 [ 1337.083780][T27795] ? xas_create+0x1197/0x1910 [ 1337.088465][T27795] should_failslab+0x9/0x20 [ 1337.092971][T27795] kmem_cache_alloc+0x56/0x2e0 [ 1337.097732][T27795] xas_create+0x1197/0x1910 [ 1337.102246][T27795] xas_create_range+0x142/0x700 [ 1337.107106][T27795] shmem_add_to_page_cache+0x91e/0x1290 [ 1337.112673][T27795] shmem_getpage_gfp+0x121e/0x2a90 [ 1337.120249][T27795] shmem_write_begin+0xcb/0x1b0 [ 1337.125108][T27795] generic_perform_write+0x25d/0x4e0 [ 1337.130419][T27795] __generic_file_write_iter+0x235/0x500 [ 1337.136074][T27795] generic_file_write_iter+0x48e/0x630 [ 1337.141556][T27795] __vfs_write+0x5a1/0x740 [ 1337.145993][T27795] vfs_write+0x275/0x590 [ 1337.150251][T27795] __x64_sys_pwrite64+0x162/0x1d0 [ 1337.155283][T27795] do_syscall_64+0xf7/0x1c0 [ 1337.159789][T27795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1337.165676][T27795] RIP: 0033:0x414437 11:05:24 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:24 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1e000000]}) [ 1337.169569][T27795] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1337.189180][T27795] RSP: 002b:00007f1d3e743a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1337.197606][T27795] RAX: ffffffffffffffda RBX: 0000000020000250 RCX: 0000000000414437 [ 1337.205589][T27795] RDX: 0000000000000048 RSI: 00000000200007c0 RDI: 0000000000000004 [ 1337.213571][T27795] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1337.221570][T27795] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 11:05:24 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0xffffffff]}) 11:05:24 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xb000000]}) [ 1337.229548][T27795] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1337.291917][T27809] /dev/loop0: Can't open blockdev 11:05:25 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:25 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x74000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:25 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xc000000]}) 11:05:25 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:05:25 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x25000000]}) [ 1337.543030][T27823] /dev/loop0: Can't open blockdev 11:05:25 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xd000000]}) [ 1337.578907][T27828] /dev/loop0: Can't open blockdev [ 1337.609740][T27831] FAULT_INJECTION: forcing a failure. [ 1337.609740][T27831] name failslab, interval 1, probability 0, space 0, times 0 [ 1337.622383][T27831] CPU: 0 PID: 27831 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1337.631053][T27831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1337.641135][T27831] Call Trace: [ 1337.644429][T27831] dump_stack+0x1fb/0x318 [ 1337.649462][T27831] should_fail+0x555/0x770 [ 1337.653892][T27831] __should_failslab+0x11a/0x160 11:05:25 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe000000]}) 11:05:25 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x2]}) 11:05:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1337.658833][T27831] ? xas_create+0x1197/0x1910 [ 1337.663508][T27831] should_failslab+0x9/0x20 [ 1337.668014][T27831] kmem_cache_alloc+0x56/0x2e0 [ 1337.672784][T27831] xas_create+0x1197/0x1910 [ 1337.677310][T27831] xas_create_range+0x142/0x700 [ 1337.682217][T27831] shmem_add_to_page_cache+0x91e/0x1290 [ 1337.687798][T27831] shmem_getpage_gfp+0x121e/0x2a90 [ 1337.693072][T27831] shmem_write_begin+0xcb/0x1b0 [ 1337.697937][T27831] generic_perform_write+0x25d/0x4e0 [ 1337.703245][T27831] __generic_file_write_iter+0x235/0x500 11:05:25 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x10000000]}) [ 1337.708887][T27831] generic_file_write_iter+0x48e/0x630 [ 1337.714360][T27831] __vfs_write+0x5a1/0x740 [ 1337.718796][T27831] vfs_write+0x275/0x590 [ 1337.723052][T27831] __x64_sys_pwrite64+0x162/0x1d0 [ 1337.728080][T27831] do_syscall_64+0xf7/0x1c0 [ 1337.732588][T27831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1337.738483][T27831] RIP: 0033:0x414437 11:05:25 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x7a000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1337.742903][T27831] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1337.762512][T27831] RSP: 002b:00007f1d3e743a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 1337.770919][T27831] RAX: ffffffffffffffda RBX: 0000000020000250 RCX: 0000000000414437 [ 1337.778878][T27831] RDX: 0000000000000048 RSI: 00000000200007c0 RDI: 0000000000000004 [ 1337.786963][T27831] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1337.795030][T27831] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 1337.803127][T27831] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1337.843602][T27842] /dev/loop0: Can't open blockdev [ 1337.867732][T27845] /dev/loop0: Can't open blockdev 11:05:25 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:25 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x3]}) 11:05:25 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x40000000]}) 11:05:25 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x11000000]}) 11:05:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x8000000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:25 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x8cffffff, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:25 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5c000000]}) 11:05:25 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x12000000]}) 11:05:25 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x8096980000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1338.027152][T27864] FAULT_INJECTION: forcing a failure. [ 1338.027152][T27864] name failslab, interval 1, probability 0, space 0, times 0 11:05:25 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xc0ed0000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:25 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x4]}) [ 1338.112239][T27864] CPU: 0 PID: 27864 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1338.120953][T27864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.131000][T27864] Call Trace: [ 1338.131018][T27864] dump_stack+0x1fb/0x318 [ 1338.131033][T27864] should_fail+0x555/0x770 [ 1338.131048][T27864] __should_failslab+0x11a/0x160 [ 1338.131058][T27864] ? getname_flags+0xba/0x640 [ 1338.131067][T27864] should_failslab+0x9/0x20 [ 1338.131076][T27864] kmem_cache_alloc+0x56/0x2e0 [ 1338.131084][T27864] ? check_preemption_disabled+0xb7/0x2a0 [ 1338.131094][T27864] getname_flags+0xba/0x640 [ 1338.131107][T27864] getname+0x19/0x20 [ 1338.131119][T27864] do_sys_open+0x261/0x560 [ 1338.131135][T27864] __x64_sys_open+0x87/0x90 [ 1338.131156][T27864] do_syscall_64+0xf7/0x1c0 [ 1338.131169][T27864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1338.131178][T27864] RIP: 0033:0x4143d1 [ 1338.131189][T27864] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1338.131197][T27864] RSP: 002b:00007f1d3e743a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1338.227260][T27864] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 00000000004143d1 [ 1338.235239][T27864] RDX: 00007f1d3e743b0a RSI: 0000000000000002 RDI: 00007f1d3e743b00 [ 1338.243219][T27864] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1338.251224][T27864] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 11:05:26 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe7ffffff]}) [ 1338.251347][T27875] /dev/loop0: Can't open blockdev [ 1338.259192][T27864] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1338.362490][T27883] /dev/loop0: Can't open blockdev 11:05:26 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:26 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x14000000]}) 11:05:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5]}) 11:05:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:26 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xfdfdffff]}) 11:05:26 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xebffffff, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x6]}) [ 1338.513911][T27896] FAULT_INJECTION: forcing a failure. [ 1338.513911][T27896] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1338.527165][T27896] CPU: 1 PID: 27896 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1338.535921][T27896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1338.545968][T27896] Call Trace: [ 1338.545986][T27896] dump_stack+0x1fb/0x318 [ 1338.546001][T27896] should_fail+0x555/0x770 [ 1338.546018][T27896] should_fail_alloc_page+0x55/0x60 11:05:26 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1e000000]}) 11:05:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x7]}) [ 1338.546026][T27896] prepare_alloc_pages+0x283/0x460 [ 1338.546039][T27896] __alloc_pages_nodemask+0xb2/0x5d0 [ 1338.546053][T27896] ? __kasan_check_write+0x14/0x20 [ 1338.578860][T27896] kmem_getpages+0x4d/0xa00 [ 1338.583385][T27896] cache_grow_begin+0x7e/0x2c0 [ 1338.588201][T27896] cache_alloc_refill+0x311/0x3f0 [ 1338.593249][T27896] ? check_preemption_disabled+0xb7/0x2a0 [ 1338.598992][T27896] kmem_cache_alloc+0x2b9/0x2e0 [ 1338.603862][T27896] ? getname_flags+0xba/0x640 [ 1338.608556][T27896] getname_flags+0xba/0x640 [ 1338.613077][T27896] getname+0x19/0x20 [ 1338.617077][T27896] do_sys_open+0x261/0x560 [ 1338.621504][T27896] __x64_sys_open+0x87/0x90 [ 1338.625996][T27896] do_syscall_64+0xf7/0x1c0 [ 1338.626010][T27896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1338.626019][T27896] RIP: 0033:0x4143d1 [ 1338.626028][T27896] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 11:05:26 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x25000000]}) 11:05:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x8]}) [ 1338.626033][T27896] RSP: 002b:00007f1d3e743a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1338.626042][T27896] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 00000000004143d1 [ 1338.626051][T27896] RDX: 00007f1d3e743b0a RSI: 0000000000000002 RDI: 00007f1d3e743b00 [ 1338.684249][T27896] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1338.692345][T27896] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1338.700327][T27896] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:26 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xfffffdfd]}) 11:05:26 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:26 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xf6ffffff, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:26 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xffffffe7]}) 11:05:26 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x3f000000]}) 11:05:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xc400000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x9]}) 11:05:26 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x40000000]}) 11:05:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd400000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:26 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xffffffff]}) 11:05:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xa]}) 11:05:26 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xf9fdffff, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1339.032903][T27934] FAULT_INJECTION: forcing a failure. [ 1339.032903][T27934] name failslab, interval 1, probability 0, space 0, times 0 11:05:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd500000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1339.110727][T27934] CPU: 1 PID: 27934 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1339.119452][T27934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1339.129517][T27934] Call Trace: [ 1339.132890][T27934] dump_stack+0x1fb/0x318 [ 1339.137251][T27934] should_fail+0x555/0x770 [ 1339.141716][T27934] __should_failslab+0x11a/0x160 [ 1339.146688][T27934] ? __alloc_file+0x2c/0x390 [ 1339.151374][T27934] should_failslab+0x9/0x20 [ 1339.156233][T27934] kmem_cache_alloc+0x56/0x2e0 [ 1339.161004][T27934] __alloc_file+0x2c/0x390 [ 1339.165453][T27934] alloc_empty_file+0xac/0x1b0 [ 1339.170223][T27934] path_openat+0x9e/0x4420 [ 1339.176126][T27934] ? __kasan_kmalloc+0x178/0x1b0 [ 1339.181083][T27934] ? __lock_acquire+0xc75/0x1be0 [ 1339.186028][T27934] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1339.191769][T27934] do_filp_open+0x192/0x3d0 [ 1339.201577][T27934] ? _raw_spin_unlock+0x2c/0x50 [ 1339.206446][T27934] do_sys_open+0x29f/0x560 [ 1339.206466][T27934] __x64_sys_open+0x87/0x90 [ 1339.206479][T27934] do_syscall_64+0xf7/0x1c0 [ 1339.206499][T27934] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1339.225775][T27934] RIP: 0033:0x4143d1 [ 1339.229679][T27934] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1339.249894][T27934] RSP: 002b:00007f1d3e743a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 11:05:26 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:26 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5c000000]}) 11:05:26 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd600000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:26 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xfeffffff, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:26 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:05:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xb]}) [ 1339.258465][T27934] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 00000000004143d1 [ 1339.258471][T27934] RDX: 00007f1d3e743b0a RSI: 0000000000000002 RDI: 00007f1d3e743b00 [ 1339.258476][T27934] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1339.258481][T27934] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1339.258485][T27934] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:27 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x2]}) 11:05:27 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe7ffffff]}) 11:05:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xd700000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:27 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xfffffdf9, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1339.382566][T27961] FAULT_INJECTION: forcing a failure. [ 1339.382566][T27961] name failslab, interval 1, probability 0, space 0, times 0 [ 1339.421729][T27961] CPU: 1 PID: 27961 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1339.430473][T27961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1339.440556][T27961] Call Trace: [ 1339.440577][T27961] dump_stack+0x1fb/0x318 [ 1339.440591][T27961] should_fail+0x555/0x770 [ 1339.440608][T27961] __should_failslab+0x11a/0x160 [ 1339.440620][T27961] ? tomoyo_encode2+0x273/0x5a0 [ 1339.440630][T27961] should_failslab+0x9/0x20 [ 1339.440637][T27961] __kmalloc+0x7a/0x340 [ 1339.440649][T27961] tomoyo_encode2+0x273/0x5a0 [ 1339.440665][T27961] tomoyo_realpath_from_path+0x769/0x7c0 11:05:27 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x3]}) [ 1339.440684][T27961] tomoyo_check_open_permission+0x1ce/0x9d0 [ 1339.440718][T27961] tomoyo_file_open+0x141/0x190 [ 1339.440730][T27961] security_file_open+0x65/0x2f0 [ 1339.440743][T27961] do_dentry_open+0x351/0x10c0 [ 1339.440764][T27961] vfs_open+0x73/0x80 [ 1339.440775][T27961] path_openat+0x1397/0x4420 [ 1339.440820][T27961] do_filp_open+0x192/0x3d0 [ 1339.440846][T27961] do_sys_open+0x29f/0x560 [ 1339.457788][T27961] __x64_sys_open+0x87/0x90 [ 1339.467102][T27961] do_syscall_64+0xf7/0x1c0 [ 1339.523935][T27961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1339.534366][T27961] RIP: 0033:0x4143d1 [ 1339.534376][T27961] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1339.534381][T27961] RSP: 002b:00007f1d3e743a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1339.534390][T27961] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 00000000004143d1 [ 1339.534395][T27961] RDX: 00007f1d3e743b0a RSI: 0000000000000002 RDI: 00007f1d3e743b00 11:05:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xc]}) [ 1339.534399][T27961] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1339.534404][T27961] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1339.534409][T27961] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1339.661665][T27961] ERROR: Out of memory at tomoyo_realpath_from_path. 11:05:27 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xe401000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:27 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xffffff7f, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xd]}) 11:05:27 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xfdfdffff]}) 11:05:27 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x4]}) [ 1339.844428][T27996] FAULT_INJECTION: forcing a failure. [ 1339.844428][T27996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1339.858801][T27996] CPU: 0 PID: 27996 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1339.867830][T27996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1339.877893][T27996] Call Trace: [ 1339.881212][T27996] dump_stack+0x1fb/0x318 [ 1339.885538][T27996] should_fail+0x555/0x770 [ 1339.885557][T27996] should_fail_alloc_page+0x55/0x60 [ 1339.885565][T27996] prepare_alloc_pages+0x283/0x460 [ 1339.885579][T27996] __alloc_pages_nodemask+0xb2/0x5d0 [ 1339.885597][T27996] kmem_getpages+0x4d/0xa00 [ 1339.885609][T27996] cache_grow_begin+0x7e/0x2c0 [ 1339.885622][T27996] cache_alloc_refill+0x311/0x3f0 [ 1339.885632][T27996] ? check_preemption_disabled+0xb7/0x2a0 [ 1339.885645][T27996] __kmalloc+0x318/0x340 [ 1339.885655][T27996] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1339.885666][T27996] tomoyo_realpath_from_path+0xdc/0x7c0 11:05:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe]}) 11:05:27 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5]}) [ 1339.885684][T27996] tomoyo_check_open_permission+0x1ce/0x9d0 [ 1339.885719][T27996] tomoyo_file_open+0x141/0x190 [ 1339.951920][T27996] security_file_open+0x65/0x2f0 [ 1339.956861][T27996] do_dentry_open+0x351/0x10c0 [ 1339.961631][T27996] vfs_open+0x73/0x80 [ 1339.965629][T27996] path_openat+0x1397/0x4420 [ 1339.970269][T27996] do_filp_open+0x192/0x3d0 [ 1339.970306][T27996] do_sys_open+0x29f/0x560 [ 1339.970323][T27996] __x64_sys_open+0x87/0x90 [ 1339.970338][T27996] do_syscall_64+0xf7/0x1c0 11:05:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x10]}) 11:05:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xe803000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:27 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xfffffdfd]}) [ 1339.970353][T27996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1339.970363][T27996] RIP: 0033:0x4143d1 [ 1339.970373][T27996] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1339.970378][T27996] RSP: 002b:00007f1d3e743a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1339.970388][T27996] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 00000000004143d1 11:05:27 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xffffff8c, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1339.970395][T27996] RDX: 00007f1d3e743b0a RSI: 0000000000000002 RDI: 00007f1d3e743b00 [ 1339.970400][T27996] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1339.970406][T27996] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1339.970411][T27996] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:27 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:27 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xffffffe7]}) 11:05:27 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x11]}) 11:05:27 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x6]}) 11:05:27 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xffffffeb, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:28 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xffffffff]}) 11:05:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x12]}) [ 1340.289641][T28028] FAULT_INJECTION: forcing a failure. [ 1340.289641][T28028] name failslab, interval 1, probability 0, space 0, times 0 11:05:28 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x7]}) [ 1340.373987][T28028] CPU: 0 PID: 28028 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1340.382841][T28028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.392906][T28028] Call Trace: [ 1340.396236][T28028] dump_stack+0x1fb/0x318 [ 1340.400578][T28028] should_fail+0x555/0x770 [ 1340.405003][T28028] __should_failslab+0x11a/0x160 [ 1340.409948][T28028] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1340.415667][T28028] should_failslab+0x9/0x20 [ 1340.420168][T28028] __kmalloc+0x7a/0x340 11:05:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x14]}) [ 1340.424326][T28028] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1340.430045][T28028] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1340.435597][T28028] tomoyo_path_number_perm+0x166/0x640 [ 1340.441074][T28028] ? smack_file_ioctl+0x226/0x2e0 [ 1340.446128][T28028] ? __fget+0x4d1/0x510 [ 1340.450294][T28028] tomoyo_file_ioctl+0x23/0x30 [ 1340.455058][T28028] security_file_ioctl+0x6d/0xd0 [ 1340.460000][T28028] __x64_sys_ioctl+0xa3/0x120 [ 1340.464688][T28028] do_syscall_64+0xf7/0x1c0 [ 1340.469192][T28028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1340.475077][T28028] RIP: 0033:0x45a4a7 [ 1340.478970][T28028] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1340.498579][T28028] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1340.506994][T28028] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1340.515000][T28028] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 11:05:28 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1340.522976][T28028] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1340.530953][T28028] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1340.538938][T28028] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1340.554299][T28028] ERROR: Out of memory at tomoyo_realpath_from_path. 11:05:28 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:28 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xfffffff6, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:28 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x8]}) 11:05:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1e]}) 11:05:28 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x2]}) 11:05:28 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xfffffffe, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xff0f000000000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1340.744645][T28063] FAULT_INJECTION: forcing a failure. [ 1340.744645][T28063] name failslab, interval 1, probability 0, space 0, times 0 [ 1340.775904][T28063] CPU: 0 PID: 28063 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1340.784620][T28063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1340.794680][T28063] Call Trace: [ 1340.797979][T28063] dump_stack+0x1fb/0x318 [ 1340.802318][T28063] should_fail+0x555/0x770 [ 1340.806745][T28063] __should_failslab+0x11a/0x160 [ 1340.811690][T28063] ? tomoyo_encode2+0x273/0x5a0 [ 1340.816540][T28063] should_failslab+0x9/0x20 [ 1340.821049][T28063] __kmalloc+0x7a/0x340 [ 1340.825215][T28063] tomoyo_encode2+0x273/0x5a0 [ 1340.829902][T28063] tomoyo_realpath_from_path+0x769/0x7c0 [ 1340.835539][T28063] tomoyo_check_open_permission+0x1ce/0x9d0 11:05:28 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x9]}) 11:05:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x25]}) 11:05:28 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x10000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:28 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x3]}) [ 1340.841457][T28063] tomoyo_file_open+0x141/0x190 [ 1340.846305][T28063] security_file_open+0x65/0x2f0 [ 1340.851273][T28063] do_dentry_open+0x351/0x10c0 [ 1340.856044][T28063] vfs_open+0x73/0x80 [ 1340.860029][T28063] path_openat+0x1397/0x4420 [ 1340.864663][T28063] do_filp_open+0x192/0x3d0 [ 1340.869272][T28063] do_sys_open+0x29f/0x560 [ 1340.873811][T28063] __x64_sys_open+0x87/0x90 [ 1340.878319][T28063] do_syscall_64+0xf7/0x1c0 [ 1340.882834][T28063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1340.888816][T28063] RIP: 0033:0x4143d1 [ 1340.892713][T28063] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 1340.912325][T28063] RSP: 002b:00007f1d3e743a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 1340.920767][T28063] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 00000000004143d1 [ 1340.928752][T28063] RDX: 00007f1d3e743b0a RSI: 0000000000000002 RDI: 00007f1d3e743b00 [ 1340.937101][T28063] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1340.945111][T28063] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 1340.953087][T28063] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1341.050093][T28063] ERROR: Out of memory at tomoyo_realpath_from_path. 11:05:28 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xfffdffff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:28 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5c]}) 11:05:28 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x4]}) 11:05:28 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xa]}) 11:05:28 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xedc000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:29 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xb]}) 11:05:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:29 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5]}) 11:05:29 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x1000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe7]}) [ 1341.296929][T28100] FAULT_INJECTION: forcing a failure. [ 1341.296929][T28100] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.387229][T28100] CPU: 0 PID: 28100 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1341.395968][T28100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.406045][T28100] Call Trace: [ 1341.409523][T28100] dump_stack+0x1fb/0x318 [ 1341.413878][T28100] should_fail+0x555/0x770 [ 1341.418312][T28100] __should_failslab+0x11a/0x160 [ 1341.423269][T28100] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1341.429005][T28100] should_failslab+0x9/0x20 [ 1341.433520][T28100] __kmalloc+0x7a/0x340 11:05:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x300]}) [ 1341.437695][T28100] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1341.443431][T28100] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1341.448997][T28100] tomoyo_path_number_perm+0x166/0x640 [ 1341.456666][T28100] ? smack_file_ioctl+0x226/0x2e0 [ 1341.461698][T28100] ? __fget+0x4d1/0x510 [ 1341.465868][T28100] tomoyo_file_ioctl+0x23/0x30 [ 1341.470637][T28100] security_file_ioctl+0x6d/0xd0 [ 1341.475579][T28100] __x64_sys_ioctl+0xa3/0x120 [ 1341.480272][T28100] do_syscall_64+0xf7/0x1c0 [ 1341.484786][T28100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1341.490802][T28100] RIP: 0033:0x45a4a7 [ 1341.494695][T28100] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1341.514333][T28100] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1341.514344][T28100] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1341.514348][T28100] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1341.514353][T28100] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1341.514357][T28100] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1341.514362][T28100] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1341.559488][T28100] ERROR: Out of memory at tomoyo_realpath_from_path. 11:05:29 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:29 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x6]}) 11:05:29 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xc]}) 11:05:29 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x100000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x500]}) 11:05:29 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xd]}) 11:05:29 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x200000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:29 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x7]}) 11:05:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x600]}) [ 1341.841802][T28137] FAULT_INJECTION: forcing a failure. [ 1341.841802][T28137] name failslab, interval 1, probability 0, space 0, times 0 [ 1341.860669][T28137] CPU: 0 PID: 28137 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1341.869409][T28137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1341.879475][T28137] Call Trace: [ 1341.882782][T28137] dump_stack+0x1fb/0x318 [ 1341.887128][T28137] should_fail+0x555/0x770 11:05:29 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x300000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1341.891566][T28137] __should_failslab+0x11a/0x160 [ 1341.896541][T28137] ? __kernfs_new_node+0x97/0x6b0 [ 1341.901575][T28137] should_failslab+0x9/0x20 [ 1341.906094][T28137] kmem_cache_alloc+0x56/0x2e0 [ 1341.910881][T28137] __kernfs_new_node+0x97/0x6b0 [ 1341.915738][T28137] ? bd_set_size+0x97/0xb0 [ 1341.920188][T28137] kernfs_create_dir_ns+0x9b/0x230 [ 1341.925307][T28137] internal_create_group+0x207/0xd80 [ 1341.930620][T28137] sysfs_create_group+0x1f/0x30 [ 1341.935558][T28137] loop_set_fd+0xf54/0x1470 [ 1341.940088][T28137] lo_ioctl+0xd5/0x2200 [ 1341.944257][T28137] ? __kasan_slab_free+0x12a/0x1e0 [ 1341.949380][T28137] ? kasan_slab_free+0xe/0x10 [ 1341.954069][T28137] ? kfree+0x115/0x200 [ 1341.958152][T28137] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1341.963814][T28137] ? tomoyo_file_ioctl+0x23/0x30 [ 1341.968761][T28137] ? security_file_ioctl+0x6d/0xd0 [ 1341.973918][T28137] ? __x64_sys_ioctl+0xa3/0x120 [ 1341.978782][T28137] ? do_syscall_64+0xf7/0x1c0 [ 1341.983470][T28137] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1341.989563][T28137] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1341.995292][T28137] ? rcu_lock_release+0x9/0x30 [ 1342.000047][T28137] ? rcu_lock_release+0x9/0x30 [ 1342.004801][T28137] ? lo_release+0x1f0/0x1f0 [ 1342.009393][T28137] blkdev_ioctl+0x807/0x2980 [ 1342.013985][T28137] ? tomoyo_path_number_perm+0x53e/0x640 [ 1342.019623][T28137] block_ioctl+0xbd/0x100 [ 1342.023933][T28137] ? blkdev_iopoll+0x100/0x100 [ 1342.028685][T28137] do_vfs_ioctl+0x744/0x1730 [ 1342.033260][T28137] ? __fget+0x4d1/0x510 [ 1342.037407][T28137] ? tomoyo_file_ioctl+0x23/0x30 [ 1342.042328][T28137] ? security_file_ioctl+0xa1/0xd0 [ 1342.047426][T28137] __x64_sys_ioctl+0xe3/0x120 [ 1342.052108][T28137] do_syscall_64+0xf7/0x1c0 [ 1342.056597][T28137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.062466][T28137] RIP: 0033:0x45a4a7 [ 1342.066338][T28137] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1342.085922][T28137] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1342.094320][T28137] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1342.102287][T28137] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1342.111377][T28137] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1342.119345][T28137] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1342.127297][T28137] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:29 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:29 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x400000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:29 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x8]}) 11:05:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:29 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x700]}) 11:05:29 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe]}) 11:05:30 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x9]}) 11:05:30 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x420000100000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:30 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x10]}) [ 1342.378541][T28173] FAULT_INJECTION: forcing a failure. [ 1342.378541][T28173] name failslab, interval 1, probability 0, space 0, times 0 11:05:30 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xa]}) [ 1342.439730][T28173] CPU: 0 PID: 28173 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1342.448446][T28173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.458509][T28173] Call Trace: [ 1342.461804][T28173] dump_stack+0x1fb/0x318 [ 1342.466138][T28173] should_fail+0x555/0x770 [ 1342.470598][T28173] __should_failslab+0x11a/0x160 [ 1342.475550][T28173] ? __kernfs_new_node+0x97/0x6b0 [ 1342.480575][T28173] should_failslab+0x9/0x20 [ 1342.485081][T28173] kmem_cache_alloc+0x56/0x2e0 11:05:30 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xb]}) [ 1342.489852][T28173] __kernfs_new_node+0x97/0x6b0 [ 1342.494713][T28173] ? mutex_unlock+0xd/0x10 [ 1342.499130][T28173] ? kernfs_activate+0x4c7/0x4e0 [ 1342.504080][T28173] kernfs_new_node+0x97/0x170 [ 1342.508755][T28173] __kernfs_create_file+0x4a/0x2f0 [ 1342.513867][T28173] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1342.519250][T28173] internal_create_group+0x4be/0xd80 [ 1342.524551][T28173] sysfs_create_group+0x1f/0x30 [ 1342.530533][T28173] loop_set_fd+0xf54/0x1470 [ 1342.535052][T28173] lo_ioctl+0xd5/0x2200 11:05:30 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xc]}) [ 1342.539210][T28173] ? __kasan_slab_free+0x12a/0x1e0 [ 1342.544321][T28173] ? kasan_slab_free+0xe/0x10 [ 1342.548998][T28173] ? kfree+0x115/0x200 [ 1342.553067][T28173] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1342.558697][T28173] ? tomoyo_file_ioctl+0x23/0x30 [ 1342.563635][T28173] ? security_file_ioctl+0x6d/0xd0 [ 1342.568740][T28173] ? __x64_sys_ioctl+0xa3/0x120 [ 1342.573860][T28173] ? do_syscall_64+0xf7/0x1c0 [ 1342.578545][T28173] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.584615][T28173] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1342.590610][T28173] ? rcu_lock_release+0x9/0x30 [ 1342.595379][T28173] ? rcu_lock_release+0x9/0x30 [ 1342.600142][T28173] ? lo_release+0x1f0/0x1f0 [ 1342.604648][T28173] blkdev_ioctl+0x807/0x2980 [ 1342.609232][T28173] ? tomoyo_path_number_perm+0x53e/0x640 [ 1342.614858][T28173] block_ioctl+0xbd/0x100 [ 1342.619168][T28173] ? blkdev_iopoll+0x100/0x100 [ 1342.623920][T28173] do_vfs_ioctl+0x744/0x1730 [ 1342.628504][T28173] ? __fget+0x4d1/0x510 [ 1342.632649][T28173] ? tomoyo_file_ioctl+0x23/0x30 [ 1342.637579][T28173] ? security_file_ioctl+0xa1/0xd0 [ 1342.642679][T28173] __x64_sys_ioctl+0xe3/0x120 [ 1342.647346][T28173] do_syscall_64+0xf7/0x1c0 [ 1342.651847][T28173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1342.657725][T28173] RIP: 0033:0x45a4a7 [ 1342.661600][T28173] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1342.681197][T28173] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1342.689774][T28173] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1342.697728][T28173] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1342.705682][T28173] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1342.718244][T28173] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1342.726199][T28173] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:30 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:30 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xd]}) 11:05:30 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x500000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1342.812159][T28170] XFS (loop3): Invalid superblock magic number [ 1342.926412][T28206] FAULT_INJECTION: forcing a failure. [ 1342.926412][T28206] name failslab, interval 1, probability 0, space 0, times 0 [ 1342.946326][T28206] CPU: 1 PID: 28206 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1342.955027][T28206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1342.965083][T28206] Call Trace: [ 1342.968364][T28206] dump_stack+0x1fb/0x318 [ 1342.972681][T28206] should_fail+0x555/0x770 [ 1342.977105][T28206] __should_failslab+0x11a/0x160 [ 1342.982035][T28206] ? __kernfs_new_node+0x97/0x6b0 [ 1342.987048][T28206] should_failslab+0x9/0x20 [ 1342.991526][T28206] kmem_cache_alloc+0x56/0x2e0 [ 1342.996275][T28206] __kernfs_new_node+0x97/0x6b0 [ 1343.001114][T28206] ? mutex_unlock+0xd/0x10 [ 1343.005518][T28206] ? kernfs_activate+0x4c7/0x4e0 [ 1343.010435][T28206] kernfs_new_node+0x97/0x170 [ 1343.015090][T28206] __kernfs_create_file+0x4a/0x2f0 [ 1343.020187][T28206] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1343.025549][T28206] internal_create_group+0x4be/0xd80 [ 1343.030832][T28206] sysfs_create_group+0x1f/0x30 [ 1343.035684][T28206] loop_set_fd+0xf54/0x1470 [ 1343.040183][T28206] lo_ioctl+0xd5/0x2200 [ 1343.044320][T28206] ? __kasan_slab_free+0x12a/0x1e0 [ 1343.049409][T28206] ? kasan_slab_free+0xe/0x10 [ 1343.054079][T28206] ? kfree+0x115/0x200 [ 1343.058128][T28206] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1343.063754][T28206] ? tomoyo_file_ioctl+0x23/0x30 [ 1343.068676][T28206] ? security_file_ioctl+0x6d/0xd0 [ 1343.073764][T28206] ? __x64_sys_ioctl+0xa3/0x120 [ 1343.078590][T28206] ? do_syscall_64+0xf7/0x1c0 [ 1343.083248][T28206] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1343.089322][T28206] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1343.095037][T28206] ? rcu_lock_release+0x9/0x30 [ 1343.099789][T28206] ? rcu_lock_release+0x9/0x30 [ 1343.104527][T28206] ? lo_release+0x1f0/0x1f0 [ 1343.109005][T28206] blkdev_ioctl+0x807/0x2980 [ 1343.113582][T28206] ? tomoyo_path_number_perm+0x53e/0x640 [ 1343.119218][T28206] block_ioctl+0xbd/0x100 [ 1343.123524][T28206] ? blkdev_iopoll+0x100/0x100 [ 1343.128292][T28206] do_vfs_ioctl+0x744/0x1730 [ 1343.132869][T28206] ? __fget+0x4d1/0x510 [ 1343.137006][T28206] ? tomoyo_file_ioctl+0x23/0x30 [ 1343.141931][T28206] ? security_file_ioctl+0xa1/0xd0 [ 1343.147028][T28206] __x64_sys_ioctl+0xe3/0x120 [ 1343.151780][T28206] do_syscall_64+0xf7/0x1c0 [ 1343.151796][T28206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1343.151805][T28206] RIP: 0033:0x45a4a7 [ 1343.151816][T28206] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1343.162164][T28206] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1343.162174][T28206] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1343.162179][T28206] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1343.162184][T28206] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1343.162188][T28206] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1343.162193][T28206] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:31 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:31 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x900]}) 11:05:31 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x11]}) 11:05:31 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe]}) 11:05:31 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x600000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:31 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1343.450691][T28222] FAULT_INJECTION: forcing a failure. [ 1343.450691][T28222] name failslab, interval 1, probability 0, space 0, times 0 [ 1343.477929][T28222] CPU: 0 PID: 28222 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1343.486655][T28222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1343.496724][T28222] Call Trace: 11:05:31 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x10]}) 11:05:31 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x11]}) [ 1343.500027][T28222] dump_stack+0x1fb/0x318 [ 1343.504370][T28222] should_fail+0x555/0x770 [ 1343.508794][T28222] __should_failslab+0x11a/0x160 [ 1343.513737][T28222] ? __kernfs_new_node+0x97/0x6b0 [ 1343.518816][T28222] should_failslab+0x9/0x20 [ 1343.523328][T28222] kmem_cache_alloc+0x56/0x2e0 [ 1343.528099][T28222] __kernfs_new_node+0x97/0x6b0 [ 1343.532961][T28222] ? __schedule+0x876/0xc30 [ 1343.537469][T28222] ? bd_set_size+0x97/0xb0 [ 1343.541897][T28222] kernfs_create_dir_ns+0x9b/0x230 11:05:31 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x12]}) [ 1343.547015][T28222] internal_create_group+0x207/0xd80 [ 1343.552318][T28222] sysfs_create_group+0x1f/0x30 [ 1343.557170][T28222] loop_set_fd+0xf54/0x1470 [ 1343.561683][T28222] lo_ioctl+0xd5/0x2200 [ 1343.565832][T28222] ? __kasan_slab_free+0x12a/0x1e0 [ 1343.570941][T28222] ? kasan_slab_free+0xe/0x10 [ 1343.575615][T28222] ? kfree+0x115/0x200 [ 1343.579677][T28222] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1343.585304][T28222] ? tomoyo_file_ioctl+0x23/0x30 [ 1343.590236][T28222] ? security_file_ioctl+0x6d/0xd0 [ 1343.595349][T28222] ? __x64_sys_ioctl+0xa3/0x120 11:05:31 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x14]}) [ 1343.600195][T28222] ? do_syscall_64+0xf7/0x1c0 [ 1343.604868][T28222] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1343.611110][T28222] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1343.616841][T28222] ? rcu_lock_release+0x9/0x30 [ 1343.621609][T28222] ? rcu_lock_release+0x9/0x30 [ 1343.626367][T28222] ? lo_release+0x1f0/0x1f0 [ 1343.630864][T28222] blkdev_ioctl+0x807/0x2980 [ 1343.635462][T28222] ? tomoyo_path_number_perm+0x53e/0x640 [ 1343.641122][T28222] block_ioctl+0xbd/0x100 [ 1343.645483][T28222] ? blkdev_iopoll+0x100/0x100 11:05:31 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1e]}) 11:05:31 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x25]}) [ 1343.650258][T28222] do_vfs_ioctl+0x744/0x1730 [ 1343.655455][T28222] ? __fget+0x4d1/0x510 [ 1343.659616][T28222] ? tomoyo_file_ioctl+0x23/0x30 [ 1343.664552][T28222] ? security_file_ioctl+0xa1/0xd0 [ 1343.669665][T28222] __x64_sys_ioctl+0xe3/0x120 [ 1343.674347][T28222] do_syscall_64+0xf7/0x1c0 [ 1343.678850][T28222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1343.684734][T28222] RIP: 0033:0x45a4a7 [ 1343.688627][T28222] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1343.708232][T28222] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1343.716646][T28222] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1343.724623][T28222] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1343.732592][T28222] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1343.740562][T28222] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1343.748530][T28222] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1343.842641][T28227] XFS (loop3): Invalid superblock magic number [ 1344.178133][T28227] XFS (loop3): Invalid superblock magic number 11:05:32 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:32 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5c]}) 11:05:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xa00]}) 11:05:32 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x12]}) 11:05:32 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x700000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:32 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1344.523564][T28268] FAULT_INJECTION: forcing a failure. [ 1344.523564][T28268] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.537077][T28268] CPU: 0 PID: 28268 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1344.545764][T28268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1344.555833][T28268] Call Trace: [ 1344.559146][T28268] dump_stack+0x1fb/0x318 [ 1344.563491][T28268] should_fail+0x555/0x770 [ 1344.567919][T28268] __should_failslab+0x11a/0x160 11:05:32 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xb00]}) 11:05:32 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x800000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:32 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x14]}) [ 1344.572861][T28268] ? radix_tree_node_alloc+0x1a1/0x370 [ 1344.579274][T28268] should_failslab+0x9/0x20 [ 1344.583775][T28268] kmem_cache_alloc+0x56/0x2e0 [ 1344.588538][T28268] radix_tree_node_alloc+0x1a1/0x370 [ 1344.593831][T28268] idr_get_free+0x2b8/0x8c0 [ 1344.598349][T28268] idr_alloc_cyclic+0x18b/0x550 [ 1344.603218][T28268] __kernfs_new_node+0x124/0x6b0 [ 1344.608163][T28268] ? bd_set_size+0x97/0xb0 [ 1344.612591][T28268] kernfs_create_dir_ns+0x9b/0x230 [ 1344.617715][T28268] internal_create_group+0x207/0xd80 11:05:32 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe7]}) [ 1344.623186][T28268] sysfs_create_group+0x1f/0x30 [ 1344.628033][T28268] loop_set_fd+0xf54/0x1470 [ 1344.632553][T28268] lo_ioctl+0xd5/0x2200 [ 1344.636711][T28268] ? __kasan_slab_free+0x12a/0x1e0 [ 1344.641825][T28268] ? kasan_slab_free+0xe/0x10 [ 1344.646498][T28268] ? kfree+0x115/0x200 [ 1344.650568][T28268] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1344.656218][T28268] ? tomoyo_file_ioctl+0x23/0x30 [ 1344.661166][T28268] ? security_file_ioctl+0x6d/0xd0 [ 1344.666285][T28268] ? __x64_sys_ioctl+0xa3/0x120 11:05:32 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x900000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1344.671147][T28268] ? do_syscall_64+0xf7/0x1c0 [ 1344.675833][T28268] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1344.681914][T28268] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1344.687654][T28268] ? rcu_lock_release+0x9/0x30 [ 1344.692425][T28268] ? rcu_lock_release+0x9/0x30 [ 1344.697192][T28268] ? lo_release+0x1f0/0x1f0 [ 1344.701694][T28268] blkdev_ioctl+0x807/0x2980 [ 1344.706301][T28268] ? tomoyo_path_number_perm+0x53e/0x640 [ 1344.711965][T28268] block_ioctl+0xbd/0x100 [ 1344.716293][T28268] ? blkdev_iopoll+0x100/0x100 11:05:32 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x300]}) [ 1344.721064][T28268] do_vfs_ioctl+0x744/0x1730 [ 1344.725653][T28268] ? __fget+0x4d1/0x510 [ 1344.729828][T28268] ? tomoyo_file_ioctl+0x23/0x30 [ 1344.734766][T28268] ? security_file_ioctl+0xa1/0xd0 [ 1344.739879][T28268] __x64_sys_ioctl+0xe3/0x120 [ 1344.744565][T28268] do_syscall_64+0xf7/0x1c0 [ 1344.749080][T28268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1344.754977][T28268] RIP: 0033:0x45a4a7 [ 1344.758878][T28268] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1344.778490][T28268] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1344.786913][T28268] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1344.794905][T28268] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1344.802895][T28268] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1344.810874][T28268] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1344.818852][T28268] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1344.921337][T28275] XFS (loop3): Invalid superblock magic number [ 1345.222521][T28275] XFS (loop3): Invalid superblock magic number 11:05:33 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:33 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x500]}) 11:05:33 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xa00000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xc00]}) 11:05:33 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1e]}) 11:05:33 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:33 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x25]}) 11:05:33 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xb00000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:33 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x600]}) 11:05:33 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xd00]}) [ 1345.640391][T28318] FAULT_INJECTION: forcing a failure. [ 1345.640391][T28318] name failslab, interval 1, probability 0, space 0, times 0 [ 1345.677712][T28318] CPU: 0 PID: 28318 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 11:05:33 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xc00000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1345.686473][T28318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1345.696549][T28318] Call Trace: [ 1345.699868][T28318] dump_stack+0x1fb/0x318 [ 1345.704215][T28318] should_fail+0x555/0x770 [ 1345.708648][T28318] __should_failslab+0x11a/0x160 [ 1345.713600][T28318] ? __kernfs_new_node+0x97/0x6b0 [ 1345.718628][T28318] should_failslab+0x9/0x20 [ 1345.723137][T28318] kmem_cache_alloc+0x56/0x2e0 [ 1345.727917][T28318] __kernfs_new_node+0x97/0x6b0 [ 1345.732786][T28318] ? __kasan_check_write+0x14/0x20 11:05:33 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xd00000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1345.737904][T28318] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 1345.743554][T28318] kernfs_new_node+0x97/0x170 [ 1345.748259][T28318] __kernfs_create_file+0x4a/0x2f0 [ 1345.753388][T28318] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1345.758782][T28318] internal_create_group+0x4be/0xd80 [ 1345.764207][T28318] sysfs_create_group+0x1f/0x30 [ 1345.769061][T28318] loop_set_fd+0xf54/0x1470 [ 1345.773578][T28318] lo_ioctl+0xd5/0x2200 [ 1345.777739][T28318] ? __kasan_slab_free+0x12a/0x1e0 [ 1345.782855][T28318] ? kasan_slab_free+0xe/0x10 [ 1345.787557][T28318] ? kfree+0x115/0x200 [ 1345.791636][T28318] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1345.797269][T28318] ? tomoyo_file_ioctl+0x23/0x30 [ 1345.802205][T28318] ? security_file_ioctl+0x6d/0xd0 [ 1345.807317][T28318] ? __x64_sys_ioctl+0xa3/0x120 [ 1345.812167][T28318] ? do_syscall_64+0xf7/0x1c0 [ 1345.816855][T28318] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1345.822922][T28318] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1345.828652][T28318] ? rcu_lock_release+0x9/0x30 [ 1345.833414][T28318] ? rcu_lock_release+0x9/0x30 [ 1345.838158][T28318] ? lo_release+0x1f0/0x1f0 [ 1345.842642][T28318] blkdev_ioctl+0x807/0x2980 [ 1345.847209][T28318] ? tomoyo_path_number_perm+0x53e/0x640 [ 1345.852831][T28318] block_ioctl+0xbd/0x100 [ 1345.857139][T28318] ? blkdev_iopoll+0x100/0x100 [ 1345.861903][T28318] do_vfs_ioctl+0x744/0x1730 [ 1345.866467][T28318] ? __fget+0x4d1/0x510 [ 1345.870664][T28318] ? tomoyo_file_ioctl+0x23/0x30 [ 1345.875580][T28318] ? security_file_ioctl+0xa1/0xd0 [ 1345.880672][T28318] __x64_sys_ioctl+0xe3/0x120 [ 1345.885337][T28318] do_syscall_64+0xf7/0x1c0 [ 1345.889830][T28318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1345.895710][T28318] RIP: 0033:0x45a4a7 [ 1345.899601][T28318] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1345.919191][T28318] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1345.927586][T28318] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1345.935562][T28318] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1345.943519][T28318] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1345.951474][T28318] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1345.959431][T28318] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1346.075474][T28327] XFS (loop3): Invalid superblock magic number 11:05:34 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:34 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xe00000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x700]}) 11:05:34 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5c]}) 11:05:34 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe00]}) 11:05:34 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:34 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x900]}) 11:05:34 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1100]}) 11:05:34 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xfffffffffffffff, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1346.738745][T28373] FAULT_INJECTION: forcing a failure. [ 1346.738745][T28373] name failslab, interval 1, probability 0, space 0, times 0 [ 1346.762615][T28373] CPU: 0 PID: 28373 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1346.771354][T28373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1346.781410][T28373] Call Trace: [ 1346.784710][T28373] dump_stack+0x1fb/0x318 11:05:34 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x1000000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1346.789108][T28373] should_fail+0x555/0x770 [ 1346.793540][T28373] __should_failslab+0x11a/0x160 [ 1346.798486][T28373] ? __kernfs_new_node+0x97/0x6b0 [ 1346.803519][T28373] should_failslab+0x9/0x20 [ 1346.808031][T28373] kmem_cache_alloc+0x56/0x2e0 [ 1346.812810][T28373] __kernfs_new_node+0x97/0x6b0 [ 1346.817666][T28373] ? mutex_unlock+0xd/0x10 [ 1346.822081][T28373] ? kernfs_activate+0x4c7/0x4e0 [ 1346.827026][T28373] kernfs_new_node+0x97/0x170 [ 1346.831712][T28373] __kernfs_create_file+0x4a/0x2f0 11:05:34 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe7]}) [ 1346.836826][T28373] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1346.842207][T28373] internal_create_group+0x4be/0xd80 [ 1346.847509][T28373] sysfs_create_group+0x1f/0x30 [ 1346.852379][T28373] loop_set_fd+0xf54/0x1470 [ 1346.856895][T28373] lo_ioctl+0xd5/0x2200 [ 1346.861059][T28373] ? __kasan_slab_free+0x12a/0x1e0 [ 1346.866169][T28373] ? kasan_slab_free+0xe/0x10 [ 1346.870931][T28373] ? kfree+0x115/0x200 [ 1346.875009][T28373] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1346.880641][T28373] ? tomoyo_file_ioctl+0x23/0x30 11:05:34 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x1100000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1346.885576][T28373] ? security_file_ioctl+0x6d/0xd0 [ 1346.890685][T28373] ? __x64_sys_ioctl+0xa3/0x120 [ 1346.895539][T28373] ? do_syscall_64+0xf7/0x1c0 [ 1346.900216][T28373] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1346.906298][T28373] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1346.912043][T28373] ? rcu_lock_release+0x9/0x30 [ 1346.916841][T28373] ? rcu_lock_release+0x9/0x30 [ 1346.921603][T28373] ? lo_release+0x1f0/0x1f0 [ 1346.926102][T28373] blkdev_ioctl+0x807/0x2980 [ 1346.930694][T28373] ? tomoyo_path_number_perm+0x53e/0x640 [ 1346.936348][T28373] block_ioctl+0xbd/0x100 [ 1346.940681][T28373] ? blkdev_iopoll+0x100/0x100 [ 1346.945446][T28373] do_vfs_ioctl+0x744/0x1730 [ 1346.950044][T28373] ? __fget+0x4d1/0x510 [ 1346.954208][T28373] ? tomoyo_file_ioctl+0x23/0x30 [ 1346.959144][T28373] ? security_file_ioctl+0xa1/0xd0 [ 1346.964257][T28373] __x64_sys_ioctl+0xe3/0x120 [ 1346.968939][T28373] do_syscall_64+0xf7/0x1c0 [ 1346.973445][T28373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1346.979329][T28373] RIP: 0033:0x45a4a7 [ 1346.983209][T28373] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1347.002933][T28373] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1347.011333][T28373] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1347.019288][T28373] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1347.027251][T28373] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1347.035202][T28373] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1347.043256][T28373] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1347.160907][T28380] XFS (loop3): Invalid superblock magic number [ 1347.504586][T28380] XFS (loop3): Invalid superblock magic number 11:05:35 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:35 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x1200000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:35 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xa00]}) 11:05:35 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x300]}) 11:05:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1200]}) 11:05:35 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:35 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x500]}) 11:05:35 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1400]}) 11:05:35 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xb00]}) [ 1347.849205][T28526] FAULT_INJECTION: forcing a failure. [ 1347.849205][T28526] name failslab, interval 1, probability 0, space 0, times 0 [ 1347.886487][T28526] CPU: 1 PID: 28526 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 11:05:35 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xc00]}) 11:05:35 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xd00]}) [ 1347.895204][T28526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1347.905392][T28526] Call Trace: [ 1347.908690][T28526] dump_stack+0x1fb/0x318 [ 1347.913034][T28526] should_fail+0x555/0x770 [ 1347.917473][T28526] __should_failslab+0x11a/0x160 [ 1347.922426][T28526] ? __kernfs_new_node+0x97/0x6b0 [ 1347.927476][T28526] should_failslab+0x9/0x20 [ 1347.931983][T28526] kmem_cache_alloc+0x56/0x2e0 [ 1347.936750][T28526] __kernfs_new_node+0x97/0x6b0 [ 1347.941607][T28526] ? mutex_unlock+0xd/0x10 11:05:35 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe00]}) [ 1347.946026][T28526] ? kernfs_activate+0x4c7/0x4e0 [ 1347.950974][T28526] kernfs_new_node+0x97/0x170 [ 1347.955782][T28526] __kernfs_create_file+0x4a/0x2f0 [ 1347.960871][T28526] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1347.966245][T28526] internal_create_group+0x4be/0xd80 [ 1347.971629][T28526] sysfs_create_group+0x1f/0x30 [ 1347.976477][T28526] loop_set_fd+0xf54/0x1470 [ 1347.981065][T28526] lo_ioctl+0xd5/0x2200 [ 1347.985222][T28526] ? __kasan_slab_free+0x12a/0x1e0 [ 1347.990330][T28526] ? kasan_slab_free+0xe/0x10 [ 1347.994996][T28526] ? kfree+0x115/0x200 [ 1347.999127][T28526] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1348.004743][T28526] ? tomoyo_file_ioctl+0x23/0x30 [ 1348.009654][T28526] ? security_file_ioctl+0x6d/0xd0 [ 1348.014744][T28526] ? __x64_sys_ioctl+0xa3/0x120 [ 1348.019574][T28526] ? do_syscall_64+0xf7/0x1c0 [ 1348.024227][T28526] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1348.030270][T28526] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1348.035973][T28526] ? rcu_lock_release+0x9/0x30 [ 1348.040732][T28526] ? rcu_lock_release+0x9/0x30 [ 1348.045626][T28526] ? lo_release+0x1f0/0x1f0 [ 1348.050136][T28526] blkdev_ioctl+0x807/0x2980 [ 1348.054731][T28526] ? tomoyo_path_number_perm+0x53e/0x640 [ 1348.060370][T28526] block_ioctl+0xbd/0x100 [ 1348.065572][T28526] ? blkdev_iopoll+0x100/0x100 [ 1348.070336][T28526] do_vfs_ioctl+0x744/0x1730 [ 1348.074930][T28526] ? __fget+0x4d1/0x510 [ 1348.079086][T28526] ? tomoyo_file_ioctl+0x23/0x30 [ 1348.084070][T28526] ? security_file_ioctl+0xa1/0xd0 [ 1348.089175][T28526] __x64_sys_ioctl+0xe3/0x120 [ 1348.093845][T28526] do_syscall_64+0xf7/0x1c0 [ 1348.098331][T28526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1348.104202][T28526] RIP: 0033:0x45a4a7 [ 1348.108088][T28526] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1348.127701][T28526] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1348.136095][T28526] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1348.144057][T28526] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1348.152021][T28526] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1348.159972][T28526] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1348.167926][T28526] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1348.266211][T28532] XFS (loop3): Invalid superblock magic number [ 1348.572474][T28532] XFS (loop3): Invalid superblock magic number 11:05:36 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:36 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x2000000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:36 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1100]}) 11:05:36 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x600]}) 11:05:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1e00]}) 11:05:36 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:36 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x700]}) 11:05:36 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x2500]}) 11:05:36 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x2010000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1348.908886][T28677] FAULT_INJECTION: forcing a failure. [ 1348.908886][T28677] name failslab, interval 1, probability 0, space 0, times 0 [ 1348.938745][T28677] CPU: 1 PID: 28677 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1348.947461][T28677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1348.957522][T28677] Call Trace: [ 1348.960826][T28677] dump_stack+0x1fb/0x318 [ 1348.965162][T28677] should_fail+0x555/0x770 [ 1348.969563][T28677] __should_failslab+0x11a/0x160 [ 1348.974488][T28677] ? __kernfs_new_node+0x97/0x6b0 [ 1348.979492][T28677] should_failslab+0x9/0x20 [ 1348.983993][T28677] kmem_cache_alloc+0x56/0x2e0 [ 1348.988749][T28677] __kernfs_new_node+0x97/0x6b0 [ 1348.993750][T28677] ? mutex_unlock+0xd/0x10 [ 1348.998145][T28677] ? kernfs_activate+0x4c7/0x4e0 [ 1349.003070][T28677] kernfs_new_node+0x97/0x170 [ 1349.007726][T28677] __kernfs_create_file+0x4a/0x2f0 [ 1349.012866][T28677] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1349.018229][T28677] internal_create_group+0x4be/0xd80 [ 1349.024169][T28677] sysfs_create_group+0x1f/0x30 [ 1349.029003][T28677] loop_set_fd+0xf54/0x1470 [ 1349.033491][T28677] lo_ioctl+0xd5/0x2200 [ 1349.037642][T28677] ? __kasan_slab_free+0x12a/0x1e0 [ 1349.042739][T28677] ? kasan_slab_free+0xe/0x10 [ 1349.047396][T28677] ? kfree+0x115/0x200 [ 1349.051441][T28677] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1349.057048][T28677] ? tomoyo_file_ioctl+0x23/0x30 [ 1349.061964][T28677] ? security_file_ioctl+0x6d/0xd0 [ 1349.067049][T28677] ? __x64_sys_ioctl+0xa3/0x120 [ 1349.071898][T28677] ? do_syscall_64+0xf7/0x1c0 [ 1349.076565][T28677] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1349.082622][T28677] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1349.088334][T28677] ? rcu_lock_release+0x9/0x30 [ 1349.093075][T28677] ? rcu_lock_release+0x9/0x30 [ 1349.097828][T28677] ? lo_release+0x1f0/0x1f0 [ 1349.102308][T28677] blkdev_ioctl+0x807/0x2980 [ 1349.106898][T28677] ? tomoyo_path_number_perm+0x53e/0x640 [ 1349.112525][T28677] block_ioctl+0xbd/0x100 [ 1349.116836][T28677] ? blkdev_iopoll+0x100/0x100 [ 1349.121596][T28677] do_vfs_ioctl+0x744/0x1730 [ 1349.126166][T28677] ? __fget+0x4d1/0x510 [ 1349.130301][T28677] ? tomoyo_file_ioctl+0x23/0x30 [ 1349.135227][T28677] ? security_file_ioctl+0xa1/0xd0 [ 1349.140315][T28677] __x64_sys_ioctl+0xe3/0x120 [ 1349.144970][T28677] do_syscall_64+0xf7/0x1c0 [ 1349.149452][T28677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1349.155315][T28677] RIP: 0033:0x45a4a7 [ 1349.159184][T28677] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1349.178777][T28677] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1349.187166][T28677] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1349.195117][T28677] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 11:05:36 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x2500000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:36 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1200]}) [ 1349.203078][T28677] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1349.211027][T28677] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1349.218987][T28677] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x3f00]}) [ 1349.339795][T28682] XFS (loop3): Invalid superblock magic number [ 1349.711029][T28682] XFS (loop3): Invalid superblock magic number 11:05:37 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:37 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:37 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x900]}) 11:05:37 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1400]}) 11:05:37 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x3f00000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x4000]}) 11:05:37 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xa00]}) 11:05:37 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1e00]}) 11:05:37 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5c00]}) 11:05:37 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x2500]}) 11:05:37 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4000000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1350.045993][T28731] FAULT_INJECTION: forcing a failure. [ 1350.045993][T28731] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.072523][T28731] CPU: 1 PID: 28731 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1350.081243][T28731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1350.091305][T28731] Call Trace: 11:05:37 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4800000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1350.094603][T28731] dump_stack+0x1fb/0x318 [ 1350.098945][T28731] should_fail+0x555/0x770 [ 1350.103376][T28731] __should_failslab+0x11a/0x160 [ 1350.108324][T28731] ? __kernfs_new_node+0x97/0x6b0 [ 1350.113366][T28731] should_failslab+0x9/0x20 [ 1350.117870][T28731] kmem_cache_alloc+0x56/0x2e0 [ 1350.122638][T28731] __kernfs_new_node+0x97/0x6b0 [ 1350.127494][T28731] ? mutex_unlock+0xd/0x10 [ 1350.131913][T28731] ? kernfs_activate+0x4c7/0x4e0 [ 1350.136872][T28731] kernfs_new_node+0x97/0x170 [ 1350.141567][T28731] __kernfs_create_file+0x4a/0x2f0 [ 1350.146861][T28731] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 1350.152239][T28731] internal_create_group+0x4be/0xd80 [ 1350.157560][T28731] sysfs_create_group+0x1f/0x30 [ 1350.162413][T28731] loop_set_fd+0xf54/0x1470 [ 1350.166907][T28731] lo_ioctl+0xd5/0x2200 [ 1350.171041][T28731] ? __kasan_slab_free+0x12a/0x1e0 [ 1350.176136][T28731] ? kasan_slab_free+0xe/0x10 [ 1350.180808][T28731] ? kfree+0x115/0x200 [ 1350.184855][T28731] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1350.190465][T28731] ? tomoyo_file_ioctl+0x23/0x30 [ 1350.195381][T28731] ? security_file_ioctl+0x6d/0xd0 [ 1350.200467][T28731] ? __x64_sys_ioctl+0xa3/0x120 [ 1350.205293][T28731] ? do_syscall_64+0xf7/0x1c0 [ 1350.210074][T28731] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1350.216127][T28731] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1350.221839][T28731] ? rcu_lock_release+0x9/0x30 [ 1350.226681][T28731] ? rcu_lock_release+0x9/0x30 [ 1350.231442][T28731] ? lo_release+0x1f0/0x1f0 [ 1350.235926][T28731] blkdev_ioctl+0x807/0x2980 [ 1350.240495][T28731] ? tomoyo_path_number_perm+0x53e/0x640 [ 1350.246116][T28731] block_ioctl+0xbd/0x100 [ 1350.250424][T28731] ? blkdev_iopoll+0x100/0x100 [ 1350.255165][T28731] do_vfs_ioctl+0x744/0x1730 [ 1350.259732][T28731] ? __fget+0x4d1/0x510 [ 1350.263870][T28731] ? tomoyo_file_ioctl+0x23/0x30 [ 1350.268782][T28731] ? security_file_ioctl+0xa1/0xd0 [ 1350.273906][T28731] __x64_sys_ioctl+0xe3/0x120 [ 1350.278563][T28731] do_syscall_64+0xf7/0x1c0 [ 1350.283051][T28731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1350.288929][T28731] RIP: 0033:0x45a4a7 [ 1350.292826][T28731] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1350.312420][T28731] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1350.320818][T28731] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1350.329053][T28731] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1350.337016][T28731] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1350.344975][T28731] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1350.353001][T28731] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1350.429149][T28733] XFS (loop3): Invalid superblock magic number [ 1350.740614][T28733] XFS (loop3): Invalid superblock magic number 11:05:38 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:38 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x4c00000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:38 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x3f00]}) 11:05:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe7ff]}) 11:05:38 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xb00]}) 11:05:38 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:38 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xc00]}) 11:05:38 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xfdfd]}) 11:05:38 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x5c00000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:38 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x4000]}) [ 1351.116497][T28779] FAULT_INJECTION: forcing a failure. [ 1351.116497][T28779] name failslab, interval 1, probability 0, space 0, times 0 [ 1351.142939][T28779] CPU: 0 PID: 28779 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1351.151743][T28779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1351.161801][T28779] Call Trace: [ 1351.165108][T28779] dump_stack+0x1fb/0x318 [ 1351.169449][T28779] should_fail+0x555/0x770 [ 1351.174045][T28779] __should_failslab+0x11a/0x160 [ 1351.179003][T28779] ? kzalloc+0x26/0x40 [ 1351.183074][T28779] should_failslab+0x9/0x20 [ 1351.187581][T28779] __kmalloc+0x7a/0x340 [ 1351.192443][T28779] kzalloc+0x26/0x40 [ 1351.196442][T28779] kobject_get_path+0xa7/0x1d0 [ 1351.201234][T28779] kobject_uevent_env+0x2f2/0x1260 [ 1351.206479][T28779] kobject_uevent+0x1f/0x30 [ 1351.210999][T28779] loop_set_fd+0xfc3/0x1470 11:05:38 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x6000000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:38 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x6800000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1351.215526][T28779] lo_ioctl+0xd5/0x2200 [ 1351.219859][T28779] ? __kasan_slab_free+0x12a/0x1e0 [ 1351.224969][T28779] ? kasan_slab_free+0xe/0x10 [ 1351.229653][T28779] ? kfree+0x115/0x200 [ 1351.233739][T28779] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1351.239372][T28779] ? tomoyo_file_ioctl+0x23/0x30 [ 1351.244369][T28779] ? security_file_ioctl+0x6d/0xd0 [ 1351.249482][T28779] ? __x64_sys_ioctl+0xa3/0x120 [ 1351.254445][T28779] ? do_syscall_64+0xf7/0x1c0 [ 1351.259102][T28779] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1351.265149][T28779] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1351.270890][T28779] ? rcu_lock_release+0x9/0x30 [ 1351.275638][T28779] ? rcu_lock_release+0x9/0x30 [ 1351.280668][T28779] ? lo_release+0x1f0/0x1f0 [ 1351.285168][T28779] blkdev_ioctl+0x807/0x2980 [ 1351.289758][T28779] ? tomoyo_path_number_perm+0x53e/0x640 [ 1351.295396][T28779] block_ioctl+0xbd/0x100 [ 1351.299701][T28779] ? blkdev_iopoll+0x100/0x100 [ 1351.304442][T28779] do_vfs_ioctl+0x744/0x1730 [ 1351.309010][T28779] ? __fget+0x4d1/0x510 [ 1351.313146][T28779] ? tomoyo_file_ioctl+0x23/0x30 [ 1351.318076][T28779] ? security_file_ioctl+0xa1/0xd0 [ 1351.323234][T28779] __x64_sys_ioctl+0xe3/0x120 [ 1351.328015][T28779] do_syscall_64+0xf7/0x1c0 [ 1351.332516][T28779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1351.338394][T28779] RIP: 0033:0x45a4a7 [ 1351.342274][T28779] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1351.362497][T28779] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1351.370964][T28779] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1351.379033][T28779] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1351.387042][T28779] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1351.395132][T28779] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1351.403147][T28779] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1351.495549][T28788] XFS (loop3): Invalid superblock magic number [ 1351.786579][T28788] XFS (loop3): Invalid superblock magic number 11:05:39 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xb, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:39 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5c00]}) 11:05:39 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x6c00000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xffe7]}) 11:05:39 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xd00]}) 11:05:39 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:39 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe00]}) 11:05:39 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe7ff]}) 11:05:39 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1000000]}) [ 1352.133945][T28829] FAULT_INJECTION: forcing a failure. [ 1352.133945][T28829] name failslab, interval 1, probability 0, space 0, times 0 11:05:39 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x7400000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1352.178039][T28829] CPU: 0 PID: 28829 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1352.186847][T28829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1352.196910][T28829] Call Trace: [ 1352.200209][T28829] dump_stack+0x1fb/0x318 [ 1352.204672][T28829] should_fail+0x555/0x770 [ 1352.209132][T28829] __should_failslab+0x11a/0x160 [ 1352.214106][T28829] should_failslab+0x9/0x20 [ 1352.218875][T28829] kmem_cache_alloc_trace+0x5d/0x2f0 11:05:39 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x7a00000000000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:39 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x8cffffff00000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1352.224168][T28829] ? kobject_uevent_env+0x2cd/0x1260 [ 1352.229556][T28829] ? dev_uevent_filter+0xb0/0xb0 [ 1352.234506][T28829] kobject_uevent_env+0x2cd/0x1260 [ 1352.239636][T28829] kobject_uevent+0x1f/0x30 [ 1352.244152][T28829] loop_set_fd+0xfc3/0x1470 [ 1352.248680][T28829] lo_ioctl+0xd5/0x2200 [ 1352.252926][T28829] ? __kasan_slab_free+0x12a/0x1e0 [ 1352.258033][T28829] ? kasan_slab_free+0xe/0x10 [ 1352.262705][T28829] ? kfree+0x115/0x200 [ 1352.266774][T28829] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1352.272410][T28829] ? tomoyo_file_ioctl+0x23/0x30 [ 1352.277349][T28829] ? security_file_ioctl+0x6d/0xd0 [ 1352.282478][T28829] ? __x64_sys_ioctl+0xa3/0x120 [ 1352.287331][T28829] ? do_syscall_64+0xf7/0x1c0 [ 1352.292014][T28829] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1352.298295][T28829] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1352.304026][T28829] ? rcu_lock_release+0x9/0x30 [ 1352.308784][T28829] ? rcu_lock_release+0x9/0x30 [ 1352.313530][T28829] ? lo_release+0x1f0/0x1f0 [ 1352.318068][T28829] blkdev_ioctl+0x807/0x2980 [ 1352.322641][T28829] ? tomoyo_path_number_perm+0x53e/0x640 [ 1352.328265][T28829] block_ioctl+0xbd/0x100 [ 1352.332571][T28829] ? blkdev_iopoll+0x100/0x100 [ 1352.337313][T28829] do_vfs_ioctl+0x744/0x1730 [ 1352.341897][T28829] ? __fget+0x4d1/0x510 [ 1352.346035][T28829] ? tomoyo_file_ioctl+0x23/0x30 [ 1352.351012][T28829] ? security_file_ioctl+0xa1/0xd0 [ 1352.356146][T28829] __x64_sys_ioctl+0xe3/0x120 [ 1352.360855][T28829] do_syscall_64+0xf7/0x1c0 [ 1352.365372][T28829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1352.371246][T28829] RIP: 0033:0x45a4a7 [ 1352.375119][T28829] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1352.394712][T28829] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1352.403113][T28829] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1352.411080][T28829] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1352.419036][T28829] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1352.426999][T28829] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1352.434962][T28829] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1352.543530][T28836] XFS (loop3): Invalid superblock magic number [ 1352.843212][T28836] XFS (loop3): Invalid superblock magic number 11:05:40 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:40 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xebffffff00000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xfdfd]}) 11:05:40 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1100]}) 11:05:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x2000000]}) 11:05:40 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:40 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1200]}) [ 1353.190268][T28885] FAULT_INJECTION: forcing a failure. [ 1353.190268][T28885] name failslab, interval 1, probability 0, space 0, times 0 [ 1353.216813][T28885] CPU: 1 PID: 28885 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1353.225702][T28885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1353.235769][T28885] Call Trace: 11:05:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xffe7]}) 11:05:40 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x3000000]}) 11:05:40 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1000000]}) [ 1353.239076][T28885] dump_stack+0x1fb/0x318 [ 1353.243439][T28885] should_fail+0x555/0x770 [ 1353.247880][T28885] __should_failslab+0x11a/0x160 [ 1353.252843][T28885] ? kzalloc+0x26/0x40 [ 1353.256923][T28885] should_failslab+0x9/0x20 [ 1353.261475][T28885] __kmalloc+0x7a/0x340 [ 1353.265649][T28885] kzalloc+0x26/0x40 [ 1353.269696][T28885] kobject_get_path+0xa7/0x1d0 [ 1353.274468][T28885] kobject_uevent_env+0x2f2/0x1260 [ 1353.279693][T28885] kobject_uevent+0x1f/0x30 [ 1353.284205][T28885] loop_set_fd+0xfc3/0x1470 11:05:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x2000000]}) [ 1353.288724][T28885] lo_ioctl+0xd5/0x2200 [ 1353.292900][T28885] ? __kasan_slab_free+0x12a/0x1e0 [ 1353.298042][T28885] ? kasan_slab_free+0xe/0x10 [ 1353.302748][T28885] ? kfree+0x115/0x200 [ 1353.306819][T28885] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1353.312459][T28885] ? tomoyo_file_ioctl+0x23/0x30 [ 1353.317394][T28885] ? security_file_ioctl+0x6d/0xd0 [ 1353.322503][T28885] ? __x64_sys_ioctl+0xa3/0x120 [ 1353.327356][T28885] ? do_syscall_64+0xf7/0x1c0 [ 1353.332037][T28885] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 11:05:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x3000000]}) [ 1353.338114][T28885] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1353.343851][T28885] ? rcu_lock_release+0x9/0x30 [ 1353.348616][T28885] ? rcu_lock_release+0x9/0x30 [ 1353.353388][T28885] ? lo_release+0x1f0/0x1f0 [ 1353.357899][T28885] blkdev_ioctl+0x807/0x2980 [ 1353.362498][T28885] ? tomoyo_path_number_perm+0x53e/0x640 [ 1353.368187][T28885] block_ioctl+0xbd/0x100 [ 1353.372518][T28885] ? blkdev_iopoll+0x100/0x100 [ 1353.377284][T28885] do_vfs_ioctl+0x744/0x1730 [ 1353.381887][T28885] ? __fget+0x4d1/0x510 [ 1353.386184][T28885] ? tomoyo_file_ioctl+0x23/0x30 [ 1353.391104][T28885] ? security_file_ioctl+0xa1/0xd0 [ 1353.396208][T28885] __x64_sys_ioctl+0xe3/0x120 [ 1353.400939][T28885] do_syscall_64+0xf7/0x1c0 [ 1353.405486][T28885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1353.411465][T28885] RIP: 0033:0x45a4a7 [ 1353.415562][T28885] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1353.435167][T28885] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1353.443568][T28885] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1353.451530][T28885] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1353.460100][T28885] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1353.468075][T28885] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1353.476116][T28885] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1353.571242][T28891] XFS (loop3): Invalid superblock magic number [ 1353.930919][T28891] XFS (loop3): Invalid superblock magic number 11:05:41 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:41 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x4000000]}) 11:05:41 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xf6ffffff00000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:41 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1400]}) 11:05:41 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x4000000]}) 11:05:41 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5000000]}) 11:05:42 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1e00]}) 11:05:42 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5000000]}) 11:05:42 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xf9fdffff00000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x6000000]}) [ 1354.358347][T28935] FAULT_INJECTION: forcing a failure. [ 1354.358347][T28935] name failslab, interval 1, probability 0, space 0, times 0 [ 1354.378628][T28935] CPU: 1 PID: 28935 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1354.387359][T28935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1354.397443][T28935] Call Trace: [ 1354.400776][T28935] dump_stack+0x1fb/0x318 11:05:42 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x7000000]}) [ 1354.405140][T28935] should_fail+0x555/0x770 [ 1354.409588][T28935] __should_failslab+0x11a/0x160 [ 1354.414540][T28935] ? kzalloc+0x26/0x40 [ 1354.418623][T28935] should_failslab+0x9/0x20 [ 1354.423139][T28935] __kmalloc+0x7a/0x340 [ 1354.427408][T28935] kzalloc+0x26/0x40 [ 1354.431319][T28935] kobject_get_path+0xa7/0x1d0 [ 1354.436369][T28935] kobject_uevent_env+0x2f2/0x1260 [ 1354.441510][T28935] kobject_uevent+0x1f/0x30 [ 1354.446028][T28935] loop_set_fd+0xfc3/0x1470 [ 1354.450550][T28935] lo_ioctl+0xd5/0x2200 [ 1354.454718][T28935] ? __kasan_slab_free+0x12a/0x1e0 [ 1354.459831][T28935] ? kasan_slab_free+0xe/0x10 [ 1354.464612][T28935] ? kfree+0x115/0x200 [ 1354.468708][T28935] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1354.474357][T28935] ? tomoyo_file_ioctl+0x23/0x30 [ 1354.479289][T28935] ? security_file_ioctl+0x6d/0xd0 [ 1354.484405][T28935] ? __x64_sys_ioctl+0xa3/0x120 [ 1354.489240][T28935] ? do_syscall_64+0xf7/0x1c0 [ 1354.493916][T28935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1354.499977][T28935] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1354.505685][T28935] ? rcu_lock_release+0x9/0x30 [ 1354.510553][T28935] ? rcu_lock_release+0x9/0x30 [ 1354.515312][T28935] ? lo_release+0x1f0/0x1f0 [ 1354.519792][T28935] blkdev_ioctl+0x807/0x2980 [ 1354.524381][T28935] ? tomoyo_path_number_perm+0x53e/0x640 [ 1354.530010][T28935] block_ioctl+0xbd/0x100 [ 1354.534759][T28935] ? blkdev_iopoll+0x100/0x100 [ 1354.539527][T28935] do_vfs_ioctl+0x744/0x1730 [ 1354.544121][T28935] ? __fget+0x4d1/0x510 [ 1354.548370][T28935] ? tomoyo_file_ioctl+0x23/0x30 [ 1354.553383][T28935] ? security_file_ioctl+0xa1/0xd0 [ 1354.558572][T28935] __x64_sys_ioctl+0xe3/0x120 [ 1354.563449][T28935] do_syscall_64+0xf7/0x1c0 [ 1354.568060][T28935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1354.573944][T28935] RIP: 0033:0x45a4a7 [ 1354.577838][T28935] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1354.597463][T28935] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1354.605875][T28935] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1354.613858][T28935] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1354.621843][T28935] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1354.629800][T28935] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1354.638101][T28935] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1354.764053][T28943] XFS (loop3): Invalid superblock magic number 11:05:43 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:43 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x8000000]}) 11:05:43 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xfeffffff00000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x6000000]}) 11:05:43 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x2500]}) 11:05:43 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x7000000]}) [ 1355.429598][T28981] FAULT_INJECTION: forcing a failure. [ 1355.429598][T28981] name failslab, interval 1, probability 0, space 0, times 0 [ 1355.454613][T28981] CPU: 1 PID: 28981 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1355.463496][T28981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1355.474624][T28981] Call Trace: [ 1355.477911][T28981] dump_stack+0x1fb/0x318 [ 1355.482249][T28981] should_fail+0x555/0x770 [ 1355.486679][T28981] __should_failslab+0x11a/0x160 [ 1355.491660][T28981] ? skb_clone+0x1cc/0x380 [ 1355.496150][T28981] should_failslab+0x9/0x20 [ 1355.500634][T28981] kmem_cache_alloc+0x56/0x2e0 [ 1355.505414][T28981] skb_clone+0x1cc/0x380 [ 1355.509641][T28981] netlink_broadcast_filtered+0x619/0x1080 [ 1355.515436][T28981] netlink_broadcast+0x3a/0x50 [ 1355.520182][T28981] kobject_uevent_env+0xcf1/0x1260 [ 1355.525298][T28981] kobject_uevent+0x1f/0x30 [ 1355.529780][T28981] loop_set_fd+0xfc3/0x1470 [ 1355.534385][T28981] lo_ioctl+0xd5/0x2200 [ 1355.538519][T28981] ? __kasan_slab_free+0x12a/0x1e0 [ 1355.544122][T28981] ? kasan_slab_free+0xe/0x10 [ 1355.548769][T28981] ? kfree+0x115/0x200 [ 1355.552825][T28981] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1355.558433][T28981] ? tomoyo_file_ioctl+0x23/0x30 [ 1355.563527][T28981] ? security_file_ioctl+0x6d/0xd0 [ 1355.568614][T28981] ? __x64_sys_ioctl+0xa3/0x120 [ 1355.573437][T28981] ? do_syscall_64+0xf7/0x1c0 [ 1355.578086][T28981] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1355.584132][T28981] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1355.589885][T28981] ? rcu_lock_release+0x9/0x30 [ 1355.594625][T28981] ? rcu_lock_release+0x9/0x30 [ 1355.599363][T28981] ? lo_release+0x1f0/0x1f0 [ 1355.603841][T28981] blkdev_ioctl+0x807/0x2980 [ 1355.608411][T28981] ? tomoyo_path_number_perm+0x53e/0x640 [ 1355.614028][T28981] block_ioctl+0xbd/0x100 [ 1355.618333][T28981] ? blkdev_iopoll+0x100/0x100 [ 1355.623069][T28981] do_vfs_ioctl+0x744/0x1730 [ 1355.627642][T28981] ? __fget+0x4d1/0x510 [ 1355.631804][T28981] ? tomoyo_file_ioctl+0x23/0x30 [ 1355.636730][T28981] ? security_file_ioctl+0xa1/0xd0 [ 1355.641829][T28981] __x64_sys_ioctl+0xe3/0x120 [ 1355.646620][T28981] do_syscall_64+0xf7/0x1c0 [ 1355.651133][T28981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1355.657016][T28981] RIP: 0033:0x45a4a7 [ 1355.660891][T28981] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:05:43 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x9000000]}) 11:05:43 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x4000]}) 11:05:43 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xffffff7f00000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1355.680475][T28981] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1355.688868][T28981] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1355.696849][T28981] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1355.704808][T28981] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1355.712782][T28981] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1355.720745][T28981] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:43 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xa000000]}) 11:05:43 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x8000000]}) [ 1355.858368][T28990] XFS (loop3): Invalid superblock magic number 11:05:44 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:44 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5c00]}) 11:05:44 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xffffffff00000000, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xb000000]}) 11:05:44 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x9000000]}) [ 1356.589507][T29022] FAULT_INJECTION: forcing a failure. [ 1356.589507][T29022] name failslab, interval 1, probability 0, space 0, times 0 [ 1356.650325][T29022] CPU: 0 PID: 29022 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1356.659070][T29022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1356.669120][T29022] Call Trace: [ 1356.672417][T29022] dump_stack+0x1fb/0x318 [ 1356.676756][T29022] should_fail+0x555/0x770 [ 1356.681187][T29022] __should_failslab+0x11a/0x160 [ 1356.686122][T29022] ? skb_clone+0x1cc/0x380 [ 1356.690535][T29022] should_failslab+0x9/0x20 [ 1356.695152][T29022] kmem_cache_alloc+0x56/0x2e0 11:05:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xc000000]}) 11:05:44 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe7ff]}) 11:05:44 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xa000000]}) [ 1356.699919][T29022] skb_clone+0x1cc/0x380 [ 1356.704167][T29022] netlink_broadcast_filtered+0x619/0x1080 [ 1356.709995][T29022] netlink_broadcast+0x3a/0x50 [ 1356.714764][T29022] kobject_uevent_env+0xcf1/0x1260 [ 1356.719879][T29022] kobject_uevent+0x1f/0x30 [ 1356.724378][T29022] loop_set_fd+0xfc3/0x1470 [ 1356.728891][T29022] lo_ioctl+0xd5/0x2200 [ 1356.733041][T29022] ? __kasan_slab_free+0x12a/0x1e0 [ 1356.738151][T29022] ? kasan_slab_free+0xe/0x10 [ 1356.742825][T29022] ? kfree+0x115/0x200 [ 1356.746896][T29022] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1356.752520][T29022] ? tomoyo_file_ioctl+0x23/0x30 [ 1356.757447][T29022] ? security_file_ioctl+0x6d/0xd0 [ 1356.762636][T29022] ? __x64_sys_ioctl+0xa3/0x120 [ 1356.767476][T29022] ? do_syscall_64+0xf7/0x1c0 [ 1356.772145][T29022] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1356.778209][T29022] ? debug_check_no_obj_freed+0x505/0x5b0 [ 1356.783945][T29022] ? rcu_lock_release+0x9/0x30 [ 1356.788710][T29022] ? rcu_lock_release+0x9/0x30 [ 1356.793469][T29022] ? lo_release+0x1f0/0x1f0 [ 1356.797962][T29022] blkdev_ioctl+0x807/0x2980 [ 1356.802551][T29022] ? tomoyo_path_number_perm+0x53e/0x640 [ 1356.808207][T29022] block_ioctl+0xbd/0x100 [ 1356.812538][T29022] ? blkdev_iopoll+0x100/0x100 [ 1356.817303][T29022] do_vfs_ioctl+0x744/0x1730 [ 1356.821887][T29022] ? __fget+0x4d1/0x510 [ 1356.826045][T29022] ? tomoyo_file_ioctl+0x23/0x30 [ 1356.831063][T29022] ? security_file_ioctl+0xa1/0xd0 [ 1356.836172][T29022] __x64_sys_ioctl+0xe3/0x120 [ 1356.840938][T29022] do_syscall_64+0xf7/0x1c0 [ 1356.845452][T29022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1356.851335][T29022] RIP: 0033:0x45a4a7 [ 1356.855223][T29022] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1356.874827][T29022] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1356.883241][T29022] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1356.891218][T29022] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 11:05:44 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0xffffffffffffff0f, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:44 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xd000000]}) [ 1356.899191][T29022] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1356.907288][T29022] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1356.915270][T29022] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:44 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'%d', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1357.072976][T29144] fuseblk: Unknown parameter '%d' [ 1357.090423][T29148] fuseblk: Unknown parameter '%d' [ 1357.107554][T29138] XFS (loop3): Invalid superblock magic number 11:05:45 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x11, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe000000]}) 11:05:45 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xfdfd]}) 11:05:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xb000000]}) 11:05:45 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:45 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'\\d', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:45 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x10000000]}) [ 1357.802559][T29162] fuseblk: Unknown parameter '\d' 11:05:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xc000000]}) 11:05:45 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xffe7]}) [ 1357.863100][T29168] fuseblk: Unknown parameter '\d' [ 1357.879947][T29169] FAULT_INJECTION: forcing a failure. [ 1357.879947][T29169] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.908235][T29169] CPU: 1 PID: 29169 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1357.916950][T29169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1357.927017][T29169] Call Trace: [ 1357.930325][T29169] dump_stack+0x1fb/0x318 [ 1357.934689][T29169] should_fail+0x555/0x770 [ 1357.939118][T29169] __should_failslab+0x11a/0x160 [ 1357.944059][T29169] ? skb_clone+0x1cc/0x380 [ 1357.948477][T29169] should_failslab+0x9/0x20 [ 1357.952977][T29169] kmem_cache_alloc+0x56/0x2e0 [ 1357.957749][T29169] skb_clone+0x1cc/0x380 [ 1357.961991][T29169] netlink_broadcast_filtered+0x619/0x1080 [ 1357.967814][T29169] netlink_broadcast+0x3a/0x50 [ 1357.972703][T29169] kobject_uevent_env+0xcf1/0x1260 [ 1357.977834][T29169] kobject_uevent+0x1f/0x30 [ 1357.979173][T29177] fuseblk: Unknown parameter 'f [ 1357.979173][T29177] ' [ 1357.982335][T29169] loop_set_fd+0xfc3/0x1470 [ 1357.994039][T29169] lo_ioctl+0xd5/0x2200 [ 1357.994780][T29179] fuseblk: Unknown parameter 'f [ 1357.994780][T29179] ' [ 1357.998193][T29169] ? __kasan_slab_free+0x12a/0x1e0 [ 1357.998202][T29169] ? kasan_slab_free+0xe/0x10 [ 1357.998212][T29169] ? kfree+0x115/0x200 [ 1357.998223][T29169] ? tomoyo_path_number_perm+0x4e1/0x640 [ 1357.998233][T29169] ? tomoyo_file_ioctl+0x23/0x30 [ 1357.998242][T29169] ? security_file_ioctl+0x6d/0xd0 [ 1357.998256][T29169] ? __x64_sys_ioctl+0xa3/0x120 [ 1358.039652][T29169] ? do_syscall_64+0xf7/0x1c0 [ 1358.044342][T29169] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1358.048078][T29181] fuseblk: Unknown parameter 'f%' [ 1358.050420][T29169] ? debug_check_no_obj_freed+0x505/0x5b0 11:05:45 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'f\n', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:45 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xd000000]}) 11:05:45 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'f%', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1358.050451][T29169] ? rcu_lock_release+0x9/0x30 [ 1358.050470][T29169] ? rcu_lock_release+0x9/0x30 [ 1358.058753][T29182] fuseblk: Unknown parameter 'f%' [ 1358.061204][T29169] ? lo_release+0x1f0/0x1f0 [ 1358.061217][T29169] blkdev_ioctl+0x807/0x2980 [ 1358.061234][T29169] ? tomoyo_path_number_perm+0x53e/0x640 [ 1358.061268][T29169] block_ioctl+0xbd/0x100 [ 1358.094748][T29169] ? blkdev_iopoll+0x100/0x100 [ 1358.099513][T29169] do_vfs_ioctl+0x744/0x1730 [ 1358.104103][T29169] ? __fget+0x4d1/0x510 [ 1358.108254][T29169] ? tomoyo_file_ioctl+0x23/0x30 [ 1358.113295][T29169] ? security_file_ioctl+0xa1/0xd0 [ 1358.118398][T29169] __x64_sys_ioctl+0xe3/0x120 [ 1358.123064][T29169] do_syscall_64+0xf7/0x1c0 [ 1358.127554][T29169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1358.134338][T29169] RIP: 0033:0x45a4a7 [ 1358.138218][T29169] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1358.157897][T29169] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1358.166293][T29169] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 000000000045a4a7 [ 1358.174267][T29169] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1358.182235][T29169] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1358.190208][T29169] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1358.198173][T29169] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1358.316997][T29171] XFS (loop3): Invalid superblock magic number 11:05:46 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x12, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:46 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'f.', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:46 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x11000000]}) 11:05:46 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1000000]}) 11:05:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe000000]}) 11:05:46 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:46 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'f/', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1359.091791][T29206] fuseblk: Unknown parameter 'f.' [ 1359.100819][T29204] FAULT_INJECTION: forcing a failure. [ 1359.100819][T29204] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1359.106862][T29208] fuseblk: Unknown parameter 'f.' [ 1359.114068][T29204] CPU: 1 PID: 29204 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1359.114078][T29204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1359.114083][T29204] Call Trace: [ 1359.114106][T29204] dump_stack+0x1fb/0x318 [ 1359.114124][T29204] should_fail+0x555/0x770 [ 1359.114141][T29204] should_fail_alloc_page+0x55/0x60 [ 1359.114149][T29204] prepare_alloc_pages+0x283/0x460 [ 1359.114163][T29204] __alloc_pages_nodemask+0xb2/0x5d0 [ 1359.114173][T29204] ? lo_release+0x1f0/0x1f0 [ 1359.114188][T29204] ? blkdev_ioctl+0x807/0x2980 [ 1359.167537][T29210] fuseblk: Unknown parameter 'f/' [ 1359.171183][T29204] kmem_getpages+0x4d/0xa00 [ 1359.171198][T29204] cache_grow_begin+0x7e/0x2c0 11:05:46 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'f\\', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1359.171211][T29204] cache_alloc_refill+0x311/0x3f0 [ 1359.171221][T29204] ? check_preemption_disabled+0xb7/0x2a0 [ 1359.171234][T29204] kmem_cache_alloc+0x2b9/0x2e0 [ 1359.179093][T29211] fuseblk: Unknown parameter 'f/' [ 1359.180992][T29204] ? getname_flags+0xba/0x640 [ 1359.181006][T29204] getname_flags+0xba/0x640 [ 1359.181022][T29204] do_mkdirat+0x3c/0x320 [ 1359.181034][T29204] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 1359.181047][T29204] ? do_syscall_64+0x1d/0x1c0 [ 1359.181060][T29204] __x64_sys_mkdir+0x60/0x70 [ 1359.228636][T29213] fuseblk: Unknown parameter 'f\' [ 1359.230876][T29204] do_syscall_64+0xf7/0x1c0 [ 1359.230895][T29204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1359.230906][T29204] RIP: 0033:0x459a57 [ 1359.230915][T29204] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1359.230925][T29204] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 11:05:47 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x2000000]}) 11:05:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x12000000]}) 11:05:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x10000000]}) [ 1359.238467][T29214] fuseblk: Unknown parameter 'f\' [ 1359.240518][T29204] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1359.240524][T29204] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1359.240530][T29204] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1359.240536][T29204] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1359.240542][T29204] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x14000000]}) [ 1359.400439][T29216] XFS (loop3): Invalid superblock magic number [ 1359.797365][T29216] XFS (loop3): Invalid superblock magic number 11:05:47 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:47 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'\\ootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:47 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x11000000]}) 11:05:47 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x3000000]}) 11:05:47 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1e000000]}) 11:05:48 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x4000000]}) 11:05:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x25000000]}) [ 1360.277898][T29246] fuseblk: Unknown parameter '\ootmode' 11:05:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x12000000]}) [ 1360.319614][T29249] fuseblk: Unknown parameter '\ootmode' [ 1360.330460][T29245] FAULT_INJECTION: forcing a failure. [ 1360.330460][T29245] name failslab, interval 1, probability 0, space 0, times 0 11:05:48 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5000000]}) [ 1360.393909][T29245] CPU: 1 PID: 29245 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1360.402636][T29245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1360.412702][T29245] Call Trace: [ 1360.416000][T29245] dump_stack+0x1fb/0x318 [ 1360.420334][T29245] should_fail+0x555/0x770 [ 1360.424886][T29245] __should_failslab+0x11a/0x160 [ 1360.429835][T29245] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1360.435555][T29245] should_failslab+0x9/0x20 [ 1360.440066][T29245] __kmalloc+0x7a/0x340 [ 1360.444225][T29245] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1360.449943][T29245] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1360.455494][T29245] tomoyo_path_number_perm+0x166/0x640 [ 1360.460978][T29245] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1360.466690][T29245] ? trace_kmem_cache_free+0xb2/0x110 [ 1360.472075][T29245] tomoyo_path_mkdir+0x9c/0xc0 [ 1360.476860][T29245] security_path_mkdir+0xed/0x170 [ 1360.481886][T29245] do_mkdirat+0x15c/0x320 [ 1360.486219][T29245] __x64_sys_mkdir+0x60/0x70 [ 1360.490804][T29245] do_syscall_64+0xf7/0x1c0 [ 1360.495312][T29245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1360.501219][T29245] RIP: 0033:0x459a57 [ 1360.505107][T29245] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1360.526005][T29245] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1360.534408][T29245] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 11:05:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x3f000000]}) 11:05:48 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'r\notmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1360.542375][T29245] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1360.550339][T29245] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1360.558304][T29245] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1360.566268][T29245] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2c, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x14000000]}) 11:05:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x40000000]}) 11:05:48 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x6000000]}) [ 1360.654301][T29245] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1360.670257][T29262] fuseblk: Unknown parameter 'r [ 1360.670257][T29262] otmode' [ 1360.724103][T29270] fuseblk: Unknown parameter 'r [ 1360.724103][T29270] otmode' 11:05:48 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x1e000000]}) 11:05:48 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'r%otmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5c000000]}) 11:05:48 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x7000000]}) 11:05:48 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x48, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:48 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x8000000]}) 11:05:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe7ffffff]}) [ 1360.941235][T29281] fuseblk: Unknown parameter 'r%otmode' 11:05:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x25000000]}) [ 1360.992707][T29293] fuseblk: Unknown parameter 'r%otmode' [ 1360.998705][T29290] FAULT_INJECTION: forcing a failure. [ 1360.998705][T29290] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.045317][T29290] CPU: 0 PID: 29290 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1361.054117][T29290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.065737][T29290] Call Trace: [ 1361.069046][T29290] dump_stack+0x1fb/0x318 [ 1361.073738][T29290] should_fail+0x555/0x770 [ 1361.078175][T29290] __should_failslab+0x11a/0x160 [ 1361.083129][T29290] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1361.088850][T29290] should_failslab+0x9/0x20 [ 1361.093353][T29290] __kmalloc+0x7a/0x340 [ 1361.097509][T29290] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1361.103241][T29290] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1361.108796][T29290] tomoyo_path_number_perm+0x166/0x640 [ 1361.114281][T29290] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1361.120028][T29290] ? trace_kmem_cache_free+0xb2/0x110 [ 1361.125405][T29290] tomoyo_path_mkdir+0x9c/0xc0 [ 1361.130169][T29290] security_path_mkdir+0xed/0x170 [ 1361.135203][T29290] do_mkdirat+0x15c/0x320 [ 1361.139544][T29290] __x64_sys_mkdir+0x60/0x70 [ 1361.144153][T29290] do_syscall_64+0xf7/0x1c0 [ 1361.148665][T29290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.154565][T29290] RIP: 0033:0x459a57 [ 1361.158462][T29290] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1361.178071][T29290] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1361.186575][T29290] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 11:05:48 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x3f000000]}) 11:05:48 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'r\\otmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1361.194673][T29290] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1361.202739][T29290] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1361.210715][T29290] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1361.218686][T29290] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1361.236807][T29284] XFS (loop3): Invalid superblock magic number 11:05:48 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xfdfdffff]}) [ 1361.278059][T29290] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1361.307553][T29306] fuseblk: Unknown parameter 'r\otmode' [ 1361.335944][T29308] fuseblk: Unknown parameter 'r\otmode' 11:05:49 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:49 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x9000000]}) 11:05:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x40000000]}) 11:05:49 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'ro\ntmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1361.521541][T29314] fuseblk: Unknown parameter 'ro [ 1361.521541][T29314] tmode' [ 1361.547335][T29320] fuseblk: Unknown parameter 'ro [ 1361.547335][T29320] tmode' [ 1361.562213][T29319] FAULT_INJECTION: forcing a failure. [ 1361.562213][T29319] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.584970][T29319] CPU: 0 PID: 29319 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1361.593676][T29319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1361.603852][T29319] Call Trace: [ 1361.607153][T29319] dump_stack+0x1fb/0x318 [ 1361.611490][T29319] should_fail+0x555/0x770 [ 1361.616057][T29319] __should_failslab+0x11a/0x160 [ 1361.621093][T29319] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1361.626818][T29319] should_failslab+0x9/0x20 [ 1361.631323][T29319] __kmalloc+0x7a/0x340 [ 1361.635479][T29319] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1361.641199][T29319] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1361.646749][T29319] tomoyo_path_number_perm+0x166/0x640 [ 1361.652234][T29319] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1361.658470][T29319] ? trace_kmem_cache_free+0xb2/0x110 [ 1361.663849][T29319] tomoyo_path_mkdir+0x9c/0xc0 [ 1361.668611][T29319] security_path_mkdir+0xed/0x170 [ 1361.673633][T29319] do_mkdirat+0x15c/0x320 [ 1361.677962][T29319] __x64_sys_mkdir+0x60/0x70 [ 1361.682550][T29319] do_syscall_64+0xf7/0x1c0 [ 1361.687052][T29319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1361.692935][T29319] RIP: 0033:0x459a57 [ 1361.696825][T29319] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1361.716434][T29319] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1361.724846][T29319] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1361.732843][T29319] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1361.740894][T29319] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1361.748864][T29319] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1361.756834][T29319] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1361.773720][T29319] ERROR: Out of memory at tomoyo_realpath_from_path. 11:05:49 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x5c000000]}) 11:05:49 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xa000000]}) 11:05:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xffffffe7]}) 11:05:49 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'ro%tmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:49 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xe7ffffff]}) 11:05:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xffffffff]}) [ 1362.003523][T29333] fuseblk: Unknown parameter 'ro%tmode' [ 1362.025276][T29335] fuseblk: Unknown parameter 'ro%tmode' [ 1362.042481][T29331] FAULT_INJECTION: forcing a failure. 11:05:49 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xb000000]}) [ 1362.042481][T29331] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1362.055720][T29331] CPU: 1 PID: 29331 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1362.064396][T29331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1362.075154][T29331] Call Trace: [ 1362.078468][T29331] dump_stack+0x1fb/0x318 [ 1362.082816][T29331] should_fail+0x555/0x770 [ 1362.087248][T29331] should_fail_alloc_page+0x55/0x60 [ 1362.092469][T29331] prepare_alloc_pages+0x283/0x460 [ 1362.097591][T29331] __alloc_pages_nodemask+0xb2/0x5d0 11:05:49 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xfdfdffff]}) 11:05:49 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl(0xffffffffffffffff, 0x8000, &(0x7f00000000c0)="5d360d7a490142d3928b8aa71190b1c109731961209a3bb912b673df287d5b4df3e27306967d188e6ea7f9b168bd05f60adf") ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x382350b897f7e4c8, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000080)=0x1) [ 1362.102894][T29331] kmem_getpages+0x4d/0xa00 [ 1362.108111][T29331] cache_grow_begin+0x7e/0x2c0 [ 1362.114535][T29331] cache_alloc_refill+0x311/0x3f0 [ 1362.119563][T29331] ? check_preemption_disabled+0xb7/0x2a0 [ 1362.125297][T29331] __kmalloc+0x318/0x340 [ 1362.129548][T29331] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1362.136498][T29331] tomoyo_realpath_from_path+0xdc/0x7c0 [ 1362.142063][T29331] tomoyo_path_number_perm+0x166/0x640 [ 1362.147555][T29331] ? rcu_read_lock_sched_held+0x10b/0x170 11:05:49 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'ro\\tmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1362.153290][T29331] ? trace_kmem_cache_free+0xb2/0x110 [ 1362.158682][T29331] tomoyo_path_mkdir+0x9c/0xc0 [ 1362.163445][T29331] security_path_mkdir+0xed/0x170 [ 1362.168478][T29331] do_mkdirat+0x15c/0x320 [ 1362.172822][T29331] __x64_sys_mkdir+0x60/0x70 [ 1362.177541][T29331] do_syscall_64+0xf7/0x1c0 [ 1362.177560][T29331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1362.177570][T29331] RIP: 0033:0x459a57 [ 1362.177581][T29331] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1362.177587][T29331] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1362.177600][T29331] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1362.228269][T29331] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1362.236252][T29331] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1362.244241][T29331] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1362.252578][T29331] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1362.307739][T29446] fuseblk: Unknown parameter 'ro\tmode' [ 1362.330484][T29454] fuseblk: Unknown parameter 'ro\tmode' [ 1362.398449][T29338] XFS (loop3): Invalid superblock magic number [ 1362.719188][T29338] XFS (loop3): Invalid superblock magic number 11:05:50 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5c, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:50 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000000)={r4}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000080)={r4, 0x1}, 0x8) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x9) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a80000000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600030000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed480000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000042adf84f58572d5f0000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74dbf80000"], 0x444}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000200)={@rand_addr="e61cd04d0dac61aac8931e98c1861b62", 0x53, r6}) r7 = request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) r8 = add_key$keyring(0x0, 0x0, 0x0, 0x0, r7) request_key(&(0x7f00000004c0)='cifs.spnego\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, r8) r9 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000001c0)='/dev/dsp#\x00', 0xfffffffffffffff8) keyctl$unlink(0x9, r8, r9) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x5, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x3}}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000280)={r4, 0x2}, &(0x7f00000002c0)=0x8) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) 11:05:50 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xc000000]}) 11:05:50 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xfffffdfd]}) 11:05:50 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'roo\nmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:50 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:50 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xffffffe7]}) [ 1363.154885][T29469] fuseblk: Unknown parameter 'roo [ 1363.154885][T29469] mode' 11:05:50 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xd000000]}) [ 1363.198163][T29473] FAULT_INJECTION: forcing a failure. [ 1363.198163][T29473] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.241073][T29480] fuseblk: Unknown parameter 'roo [ 1363.241073][T29480] mode' [ 1363.248225][T29473] CPU: 0 PID: 29473 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1363.257604][T29473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1363.257609][T29473] Call Trace: [ 1363.257628][T29473] dump_stack+0x1fb/0x318 [ 1363.257646][T29473] should_fail+0x555/0x770 [ 1363.257664][T29473] __should_failslab+0x11a/0x160 [ 1363.279713][T29473] ? tomoyo_encode2+0x273/0x5a0 [ 1363.279724][T29473] should_failslab+0x9/0x20 [ 1363.279732][T29473] __kmalloc+0x7a/0x340 [ 1363.279745][T29473] tomoyo_encode2+0x273/0x5a0 [ 1363.302824][T29473] tomoyo_realpath_from_path+0x769/0x7c0 [ 1363.308486][T29473] tomoyo_path_number_perm+0x166/0x640 [ 1363.314089][T29473] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1363.319812][T29473] ? trace_kmem_cache_free+0xb2/0x110 [ 1363.325378][T29473] tomoyo_path_mkdir+0x9c/0xc0 [ 1363.330151][T29473] security_path_mkdir+0xed/0x170 [ 1363.335183][T29473] do_mkdirat+0x15c/0x320 [ 1363.339538][T29473] __x64_sys_mkdir+0x60/0x70 [ 1363.344141][T29473] do_syscall_64+0xf7/0x1c0 [ 1363.348651][T29473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1363.354549][T29473] RIP: 0033:0x459a57 [ 1363.358447][T29473] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1363.378210][T29473] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 11:05:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0xffffffff]}) 11:05:51 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'roo%mode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1363.386622][T29473] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1363.394587][T29473] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1363.402552][T29473] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1363.410520][T29473] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1363.418489][T29473] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1363.444982][T29473] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1363.479062][T29476] XFS (loop3): Invalid superblock magic number 11:05:51 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe000000]}) 11:05:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1363.520568][T29584] fuseblk: Unknown parameter 'roo%mode' [ 1363.576024][T29596] fuseblk: Unknown parameter 'roo%mode' 11:05:51 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x60, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:51 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x10000000]}) 11:05:51 executing program 1: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac76089e17a3a0b9b00ed1ac5dc31abf3eec2", {0x0, 0x7}}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000080)=0xb20, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="58000000000000001401000008000000000000000000000099999999199999990000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000a0ed9a970000bc0000"], 0x58}, 0x0) ioctl$FIGETBSZ(r2, 0x2, &(0x7f00000000c0)) 11:05:51 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x2]}) 11:05:51 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'roo\\mode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:51 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x3]}) 11:05:51 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x11000000]}) [ 1364.141754][T29608] fuseblk: Unknown parameter 'roo\mode' [ 1364.168162][T29613] fuseblk: Unknown parameter 'roo\mode' [ 1364.202590][T29610] FAULT_INJECTION: forcing a failure. [ 1364.202590][T29610] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.251197][T29610] CPU: 1 PID: 29610 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1364.259912][T29610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.269989][T29610] Call Trace: [ 1364.273295][T29610] dump_stack+0x1fb/0x318 [ 1364.277643][T29610] should_fail+0x555/0x770 [ 1364.282074][T29610] __should_failslab+0x11a/0x160 [ 1364.287018][T29610] ? security_inode_alloc+0x36/0x1e0 [ 1364.292305][T29610] should_failslab+0x9/0x20 [ 1364.296909][T29610] kmem_cache_alloc+0x56/0x2e0 11:05:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x4]}) 11:05:52 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'root%ode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:52 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400000, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1364.301671][T29610] security_inode_alloc+0x36/0x1e0 [ 1364.306814][T29610] inode_init_always+0x3b5/0x920 [ 1364.311826][T29610] ? set_qf_name+0x3c0/0x3c0 [ 1364.316423][T29610] new_inode_pseudo+0x7f/0x240 [ 1364.321202][T29610] new_inode+0x28/0x1c0 [ 1364.325442][T29610] ? trace_ext4_request_inode+0x28b/0x2d0 [ 1364.331255][T29610] __ext4_new_inode+0x43d/0x5650 [ 1364.336194][T29610] ? memset+0x31/0x40 [ 1364.340201][T29610] ? smk_curacc+0xa3/0xe0 [ 1364.344604][T29610] ext4_mkdir+0x3f5/0x1450 [ 1364.349074][T29610] ? security_inode_permission+0xdd/0x120 [ 1364.354802][T29610] vfs_mkdir+0x43f/0x610 [ 1364.359056][T29610] do_mkdirat+0x1d7/0x320 [ 1364.363389][T29610] __x64_sys_mkdir+0x60/0x70 [ 1364.367976][T29610] do_syscall_64+0xf7/0x1c0 [ 1364.372483][T29610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.378368][T29610] RIP: 0033:0x459a57 [ 1364.382257][T29610] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 11:05:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x12000000]}) [ 1364.401858][T29610] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1364.410278][T29610] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1364.418261][T29610] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1364.426233][T29610] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1364.434199][T29610] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1364.442167][T29610] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1364.500600][T29724] fuseblk: Unknown parameter 'root%ode' [ 1364.523428][T29829] fuseblk: Unknown parameter 'root%ode' 11:05:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x64, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5]}) 11:05:52 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = dup(r0) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000240)) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={r3, 0xfffffbff, 0x101}, 0xc) 11:05:52 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:52 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootm\nde', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x14000000]}) 11:05:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x6]}) [ 1364.685687][T29837] fuseblk: Unknown parameter 'rootm [ 1364.685687][T29837] de' [ 1364.711289][T29842] FAULT_INJECTION: forcing a failure. [ 1364.711289][T29842] name failslab, interval 1, probability 0, space 0, times 0 11:05:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1e000000]}) [ 1364.745322][T29926] fuseblk: Unknown parameter 'rootm [ 1364.745322][T29926] de' [ 1364.785190][T29842] CPU: 1 PID: 29842 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 11:05:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x7]}) 11:05:52 executing program 1: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000080)={0xf73, 0xdffafe, "5a4eaab77bba319ff3eec200", {0xfffffffe, 0xfbb}, 0xdab0}) 11:05:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x68, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1364.793893][T29842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1364.803954][T29842] Call Trace: [ 1364.807256][T29842] dump_stack+0x1fb/0x318 [ 1364.811598][T29842] should_fail+0x555/0x770 [ 1364.816121][T29842] __should_failslab+0x11a/0x160 [ 1364.821069][T29842] ? smack_inode_init_security+0x3cf/0x490 [ 1364.826872][T29842] should_failslab+0x9/0x20 [ 1364.831378][T29842] __kmalloc_track_caller+0x79/0x340 [ 1364.836671][T29842] kstrdup+0x34/0x70 [ 1364.840579][T29842] smack_inode_init_security+0x3cf/0x490 [ 1364.846232][T29842] security_inode_init_security+0xfe/0x310 [ 1364.852043][T29842] ? ext4_init_security+0x40/0x40 [ 1364.857094][T29842] ext4_init_security+0x34/0x40 [ 1364.861951][T29842] __ext4_new_inode+0x446c/0x5650 [ 1364.866988][T29842] ? smk_curacc+0xa3/0xe0 [ 1364.871323][T29842] ext4_mkdir+0x3f5/0x1450 [ 1364.875754][T29842] ? security_inode_permission+0xdd/0x120 [ 1364.881481][T29842] vfs_mkdir+0x43f/0x610 [ 1364.885751][T29842] do_mkdirat+0x1d7/0x320 [ 1364.890083][T29842] __x64_sys_mkdir+0x60/0x70 11:05:52 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) connect$pptp(r0, &(0x7f0000000140)={0x18, 0x2, {0x0, @remote}}, 0x1e) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x100000, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) write$P9_RXATTRCREATE(r2, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) fcntl$setpipe(r1, 0x407, 0x7) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000001c0)={0x5, {{0xa, 0x4e23, 0x40, @dev={0xfe, 0x80, [], 0x25}, 0x3}}}, 0x88) [ 1364.894676][T29842] do_syscall_64+0xf7/0x1c0 [ 1364.899188][T29842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1364.905076][T29842] RIP: 0033:0x459a57 [ 1364.908967][T29842] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1364.928576][T29842] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1364.936997][T29842] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 11:05:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x8]}) 11:05:52 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootm%de', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x25000000]}) [ 1364.944971][T29842] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1364.952949][T29842] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1364.960931][T29842] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1364.968926][T29842] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1365.039255][T30160] fuseblk: Unknown parameter 'rootm%de' [ 1365.058746][T30163] fuseblk: Unknown parameter 'rootm%de' 11:05:52 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:52 executing program 1: bind$rose(0xffffffffffffffff, &(0x7f0000000040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) fcntl$getflags(0xffffffffffffffff, 0xb) 11:05:52 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootm\\de', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:52 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:52 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x9]}) 11:05:52 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x40000000]}) 11:05:52 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1365.202230][T30171] fuseblk: Unknown parameter 'rootm\de' [ 1365.229716][T30274] fuseblk: Unknown parameter 'rootm\de' [ 1365.238129][T30259] FAULT_INJECTION: forcing a failure. [ 1365.238129][T30259] name failslab, interval 1, probability 0, space 0, times 0 11:05:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5c000000]}) 11:05:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xa]}) [ 1365.322006][T30259] CPU: 0 PID: 30259 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1365.330723][T30259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1365.341131][T30259] Call Trace: [ 1365.344429][T30259] dump_stack+0x1fb/0x318 [ 1365.348771][T30259] should_fail+0x555/0x770 [ 1365.353202][T30259] __should_failslab+0x11a/0x160 [ 1365.358311][T30259] ? tomoyo_encode2+0x273/0x5a0 [ 1365.363267][T30259] should_failslab+0x9/0x20 [ 1365.365693][T30287] fuseblk: Unknown parameter 'rootmo [ 1365.365693][T30287] e' [ 1365.367796][T30259] __kmalloc+0x7a/0x340 [ 1365.367811][T30259] tomoyo_encode2+0x273/0x5a0 [ 1365.367826][T30259] tomoyo_realpath_from_path+0x769/0x7c0 [ 1365.367844][T30259] tomoyo_path_number_perm+0x166/0x640 [ 1365.395352][T30259] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1365.401161][T30259] ? trace_kmem_cache_free+0xb2/0x110 [ 1365.406628][T30259] tomoyo_path_mkdir+0x9c/0xc0 [ 1365.411387][T30259] security_path_mkdir+0xed/0x170 [ 1365.416410][T30259] do_mkdirat+0x15c/0x320 11:05:53 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmo\ne', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:53 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmo%e', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1365.420738][T30259] __x64_sys_mkdir+0x60/0x70 [ 1365.425681][T30259] do_syscall_64+0xf7/0x1c0 [ 1365.430181][T30259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1365.436070][T30259] RIP: 0033:0x459a57 [ 1365.439961][T30259] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1365.459564][T30259] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1365.467973][T30259] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1365.475947][T30259] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1365.483918][T30259] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1365.491900][T30259] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1365.499877][T30259] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1365.519661][T30259] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1365.528417][T30314] fuseblk: Unknown parameter 'rootmo%e' 11:05:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x74, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1365.564173][T30370] fuseblk: Unknown parameter 'rootmo%e' 11:05:53 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xb]}) 11:05:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe7ffffff]}) 11:05:53 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmo.e', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:05:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xc]}) 11:05:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xfdfdffff]}) 11:05:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1365.727189][T30406] fuseblk: Unknown parameter 'rootmo.e' [ 1365.765610][T30410] fuseblk: Unknown parameter 'rootmo.e' 11:05:53 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmo/e', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1365.812523][T30411] FAULT_INJECTION: forcing a failure. [ 1365.812523][T30411] name failslab, interval 1, probability 0, space 0, times 0 11:05:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xd]}) [ 1365.854395][T30411] CPU: 0 PID: 30411 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1365.863106][T30411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1365.873169][T30411] Call Trace: [ 1365.876600][T30411] dump_stack+0x1fb/0x318 [ 1365.880943][T30411] should_fail+0x555/0x770 [ 1365.885376][T30411] __should_failslab+0x11a/0x160 [ 1365.890339][T30411] ? security_inode_alloc+0x36/0x1e0 [ 1365.895637][T30411] should_failslab+0x9/0x20 [ 1365.900165][T30411] kmem_cache_alloc+0x56/0x2e0 11:05:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe]}) [ 1365.904957][T30411] security_inode_alloc+0x36/0x1e0 [ 1365.910077][T30411] inode_init_always+0x3b5/0x920 [ 1365.914045][T30422] fuseblk: Unknown parameter 'rootmo/e' [ 1365.915020][T30411] ? set_qf_name+0x3c0/0x3c0 [ 1365.915056][T30411] new_inode_pseudo+0x7f/0x240 [ 1365.927271][T30423] fuseblk: Unknown parameter 'rootmo/e' [ 1365.929913][T30411] new_inode+0x28/0x1c0 [ 1365.929925][T30411] ? trace_ext4_request_inode+0x28b/0x2d0 [ 1365.929939][T30411] __ext4_new_inode+0x43d/0x5650 [ 1365.950246][T30411] ? memset+0x31/0x40 [ 1365.954243][T30411] ? smk_curacc+0xa3/0xe0 [ 1365.958579][T30411] ext4_mkdir+0x3f5/0x1450 [ 1365.963005][T30411] ? security_inode_permission+0xdd/0x120 [ 1365.968717][T30411] vfs_mkdir+0x43f/0x610 [ 1365.968734][T30411] do_mkdirat+0x1d7/0x320 [ 1365.968752][T30411] __x64_sys_mkdir+0x60/0x70 [ 1365.981875][T30411] do_syscall_64+0xf7/0x1c0 [ 1365.986384][T30411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1365.992269][T30411] RIP: 0033:0x459a57 11:05:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1365.992281][T30411] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1365.992292][T30411] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1365.992302][T30411] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1365.992311][T30411] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1366.015777][T30411] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 11:05:53 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:53 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmo\\e', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x10]}) 11:05:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0xff, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:05:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xfffffdfd]}) [ 1366.015784][T30411] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1366.015789][T30411] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:53 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x103, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xffffffff}}) 11:05:53 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xffffffe7]}) [ 1366.161206][T30438] fuseblk: Unknown parameter 'rootmo\e' 11:05:53 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x11]}) 11:05:53 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc4, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1366.215598][T30440] FAULT_INJECTION: forcing a failure. [ 1366.215598][T30440] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.227731][T30442] fuseblk: Unknown parameter 'rootmo\e' 11:05:54 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmod\n', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1366.268417][T30440] CPU: 1 PID: 30440 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1366.277141][T30440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1366.287202][T30440] Call Trace: [ 1366.290517][T30440] dump_stack+0x1fb/0x318 [ 1366.294855][T30440] should_fail+0x555/0x770 [ 1366.299281][T30440] __should_failslab+0x11a/0x160 [ 1366.304226][T30440] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 1366.309784][T30440] should_failslab+0x9/0x20 11:05:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0xffffffffffffffd5, 0x0, 0xfffffffffffffd1d, &(0x7f00000001c0)=ANY=[], 0x58, 0x20000011}, 0x4008016) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e22, @multicast2}, 0x10) sync_file_range(r1, 0x7, 0xac3180e, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000, 0x0, 0x4]}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r3, 0xff, "65a1b3", "3285af0d782be2510499e159a28ecae64ba68a164bc439be8ec624b556d7ed0a20519abd239aba7d759ef1e1da8a9cd6fed903b99493cd7cd8a955d0bc9e958038ae3cc93669cf02944cabaafbf0ba662c58ec8b2cefd4ad0d7fd65de2c99609d306174d99ff28a72a867c9dde23d2aec3229303419165bcd3c8db4a55dd523f70819ec25c6efbfa87487325261c19cce1cafe0c79fc21e4955a4cfb72ed471754003dc1fdab4e9dc77055a592d917cb6f8eae97f288c06e0add0521ccf2e0a7144027352d01157dc17b78377c40839b0610ba14da4b52ee5fe84a55dec52e94db2de2cafe688ce66a2dd306eb0bb9c940ec25a96daa848e60fb985682801f76"}}, 0x110) [ 1366.314288][T30440] kmem_cache_alloc+0x56/0x2e0 [ 1366.319061][T30440] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 1366.324168][T30440] ? trace_kmalloc+0xcd/0x130 [ 1366.328931][T30440] ? kcalloc+0x2f/0x50 [ 1366.332997][T30440] ? __kmalloc+0x26c/0x340 [ 1366.337411][T30440] ? kcalloc+0x2f/0x50 [ 1366.341481][T30440] ? ext4_ext_search_right+0x4cb/0x940 [ 1366.346939][T30440] ? ext4_find_extent+0x8e0/0xaa0 [ 1366.352036][T30440] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 1366.357766][T30440] ext4_ext_map_blocks+0x4b8c/0x7170 [ 1366.363090][T30440] ext4_map_blocks+0x8f4/0x1e30 [ 1366.367953][T30440] ? __kasan_check_write+0x14/0x20 [ 1366.368998][T30451] fuseblk: Unknown parameter 'rootmod [ 1366.368998][T30451] ' [ 1366.373065][T30440] ext4_getblk+0xae/0x460 [ 1366.385081][T30440] ext4_bread+0x4a/0x340 [ 1366.388145][T30453] fuseblk: Unknown parameter 'rootmod [ 1366.388145][T30453] ' [ 1366.389327][T30440] ext4_append+0x175/0x310 [ 1366.389345][T30440] ext4_mkdir+0x7ad/0x1450 [ 1366.389372][T30440] vfs_mkdir+0x43f/0x610 [ 1366.410043][T30440] do_mkdirat+0x1d7/0x320 [ 1366.414544][T30440] __x64_sys_mkdir+0x60/0x70 11:05:54 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmod%', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1366.419226][T30440] do_syscall_64+0xf7/0x1c0 [ 1366.423733][T30440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1366.429623][T30440] RIP: 0033:0x459a57 [ 1366.433512][T30440] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1366.446203][T30456] fuseblk: Unknown parameter 'rootmod%' [ 1366.453294][T30440] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1366.453305][T30440] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1366.453311][T30440] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1366.453317][T30440] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1366.453323][T30440] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1366.453328][T30440] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1366.602319][T30449] XFS (loop3): Invalid superblock magic number 11:05:54 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:54 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xffffffff]}) 11:05:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x12]}) 11:05:54 executing program 1: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x400, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x80a180) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0), 0x10) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000240)={0xc, @vbi={0x104, 0xffffffa0, 0x80004, 0x30323953, [0x1f, 0x108], [0xfffffffd, 0x8], 0x1}}) 11:05:54 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmod\\', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:54 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2d, 'rdma'}]}, 0x6) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1366.768643][T30571] fuseblk: Unknown parameter 'rootmod\' 11:05:54 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x14]}) [ 1366.817162][T30604] fuseblk: Unknown parameter 'rootmod\' [ 1366.839700][T30613] FAULT_INJECTION: forcing a failure. [ 1366.839700][T30613] name failslab, interval 1, probability 0, space 0, times 0 [ 1366.890604][T30613] CPU: 0 PID: 30613 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1366.899408][T30613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1366.909452][T30613] Call Trace: [ 1366.909584][T30613] dump_stack+0x1fb/0x318 [ 1366.909601][T30613] should_fail+0x555/0x770 [ 1366.921603][T30613] __should_failslab+0x11a/0x160 [ 1366.921617][T30613] ? kzalloc+0x1f/0x40 [ 1366.921625][T30613] should_failslab+0x9/0x20 [ 1366.921632][T30613] __kmalloc+0x7a/0x340 [ 1366.921644][T30613] kzalloc+0x1f/0x40 [ 1366.921652][T30613] smk_parse_smack+0x197/0x230 [ 1366.921663][T30613] smk_import_entry+0x27/0x590 [ 1366.921676][T30613] smack_d_instantiate+0x78f/0xd70 [ 1366.935288][T30613] ? lockdep_init_map+0x2a/0x680 [ 1366.935303][T30613] security_d_instantiate+0xa5/0x100 [ 1366.935315][T30613] d_instantiate_new+0x65/0x120 [ 1366.935327][T30613] ext4_mkdir+0xfa9/0x1450 [ 1366.935350][T30613] vfs_mkdir+0x43f/0x610 [ 1366.935366][T30613] do_mkdirat+0x1d7/0x320 [ 1366.985953][T30613] __x64_sys_mkdir+0x60/0x70 11:05:54 executing program 4: syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000140)) [ 1366.990542][T30613] do_syscall_64+0xf7/0x1c0 [ 1366.995165][T30613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.001054][T30613] RIP: 0033:0x459a57 [ 1367.001065][T30613] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1367.001070][T30613] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1367.001079][T30613] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1367.001085][T30613] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1367.001091][T30613] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1367.001096][T30613] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1367.001101][T30613] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:54 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd4, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:54 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608dc5dc319ff3eec200"}) 11:05:54 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmodw', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:54 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) ftruncate(0xffffffffffffffff, 0x1) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0xffffffffffffff39) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f0000000080)=""/47, &(0x7f00000000c0)=0x2f) ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000040)=0x1) [ 1367.184178][T30695] fuseblk: Unknown parameter 'rootmodw' [ 1367.240898][T30701] fuseblk: Unknown parameter 'rootmodw' 11:05:55 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1e]}) 11:05:55 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000040)=0xff, 0x4) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f00000000c0)=0xf4240) ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r2 = shmget$private(0x0, 0x1000, 0x400, &(0x7f0000fff000/0x1000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x1000) 11:05:55 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000040)) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) r3 = creat(&(0x7f0000000240)='./file0\x00', 0x2c) write$P9_RRENAME(r3, &(0x7f0000000280)={0x7, 0x15, 0x2}, 0x7) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000140)={0x5, 0x8, 0x9, 0x7f, 0x7fffffff}) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000000c0)=[0x80000000, 0x10000]) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:05:55 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x300}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1367.282491][T30697] XFS (loop3): Invalid superblock magic number [ 1367.368576][T30712] fuse: Invalid rootmode 11:05:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x25]}) [ 1367.392298][T30716] fuse: Invalid rootmode [ 1367.403709][T30714] FAULT_INJECTION: forcing a failure. [ 1367.403709][T30714] name failslab, interval 1, probability 0, space 0, times 0 [ 1367.439165][T30714] CPU: 1 PID: 30714 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1367.447883][T30714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1367.458896][T30714] Call Trace: [ 1367.462191][T30714] dump_stack+0x1fb/0x318 [ 1367.466549][T30714] should_fail+0x555/0x770 [ 1367.470969][T30714] __should_failslab+0x11a/0x160 [ 1367.475903][T30714] should_failslab+0x9/0x20 [ 1367.480404][T30714] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1367.485686][T30714] ? smack_d_instantiate+0x732/0xd70 [ 1367.490969][T30714] smack_d_instantiate+0x732/0xd70 [ 1367.496078][T30714] ? lockdep_init_map+0x2a/0x680 [ 1367.501020][T30714] security_d_instantiate+0xa5/0x100 [ 1367.506302][T30714] d_instantiate_new+0x65/0x120 [ 1367.511150][T30714] ext4_mkdir+0xfa9/0x1450 [ 1367.515583][T30714] vfs_mkdir+0x43f/0x610 [ 1367.519833][T30714] do_mkdirat+0x1d7/0x320 [ 1367.524165][T30714] __x64_sys_mkdir+0x60/0x70 [ 1367.528761][T30714] do_syscall_64+0xf7/0x1c0 [ 1367.533271][T30714] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1367.539160][T30714] RIP: 0033:0x459a57 [ 1367.543400][T30714] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1367.563010][T30714] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1367.571426][T30714] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1367.579403][T30714] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 11:05:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0xb000, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x4, 0xfffffff8}, 0x3}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 11:05:55 executing program 1: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000040)=""/129, &(0x7f0000000140)=0x81) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1367.587387][T30714] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1367.595365][T30714] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1367.603446][T30714] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1367.800779][T30697] XFS (loop3): Invalid superblock magic number 11:05:55 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd5, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:55 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x500}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5c]}) 11:05:55 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x40, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x3}, 0x20000000}) 11:05:55 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:55 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{0x8}, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}], 0x58}, 0x10) r3 = dup2(r0, r2) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000140)=0x8, 0x4) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x3, @rand_addr="e5e915651ad6e80d0eb9f983b41c6146", 0x3}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0x0, @loopback, 0x9}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e22, 0x8001, @remote, 0x7}, @in6={0xa, 0x4e24, 0x7, @empty, 0x10001}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e24, 0x0, @empty, 0x3}], 0xb) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) syncfs(r4) [ 1368.180990][T31038] fuse: Invalid rootmode [ 1368.207032][T31037] FAULT_INJECTION: forcing a failure. [ 1368.207032][T31037] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.220481][T31037] CPU: 0 PID: 31037 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1368.228038][T31050] fuse: Invalid rootmode [ 1368.229148][T31037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.243460][T31037] Call Trace: [ 1368.246788][T31037] dump_stack+0x1fb/0x318 [ 1368.251129][T31037] should_fail+0x555/0x770 11:05:55 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='\xff\x1f\x00', 0x1, 0x2) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) ftruncate(r1, 0x8) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:05:55 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe7]}) [ 1368.255649][T31037] __should_failslab+0x11a/0x160 [ 1368.260592][T31037] ? __es_insert_extent+0x7ba/0x17c0 [ 1368.265891][T31037] should_failslab+0x9/0x20 [ 1368.270406][T31037] kmem_cache_alloc+0x56/0x2e0 [ 1368.275184][T31037] __es_insert_extent+0x7ba/0x17c0 [ 1368.280491][T31037] ext4_es_insert_extent+0x250/0x2ea0 [ 1368.285892][T31037] ext4_map_blocks+0xe1c/0x1e30 [ 1368.290768][T31037] ? __kasan_check_write+0x14/0x20 [ 1368.295902][T31037] ext4_getblk+0xae/0x460 [ 1368.300239][T31037] ext4_bread+0x4a/0x340 11:05:56 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x600}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1368.300256][T31037] ext4_append+0x175/0x310 [ 1368.300272][T31037] ext4_mkdir+0x7ad/0x1450 [ 1368.300304][T31037] vfs_mkdir+0x43f/0x610 [ 1368.308961][T31037] do_mkdirat+0x1d7/0x320 [ 1368.308978][T31037] __x64_sys_mkdir+0x60/0x70 [ 1368.308998][T31037] do_syscall_64+0xf7/0x1c0 [ 1368.309014][T31037] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1368.309024][T31037] RIP: 0033:0x459a57 [ 1368.309039][T31037] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1368.360431][T31037] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1368.368881][T31037] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1368.376868][T31037] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1368.384852][T31037] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1368.392860][T31037] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 11:05:56 executing program 1: ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaac4c5dc319ff3eec200"}) [ 1368.400842][T31037] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:56 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:05:56 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x300]}) [ 1368.456362][T31051] XFS (loop3): Invalid superblock magic number [ 1368.512486][T31160] fuse: Invalid rootmode [ 1368.553889][T31163] fuse: Invalid rootmode [ 1368.598562][T31164] FAULT_INJECTION: forcing a failure. [ 1368.598562][T31164] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.626995][T31164] CPU: 1 PID: 31164 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1368.635761][T31164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1368.645818][T31164] Call Trace: [ 1368.645843][T31164] dump_stack+0x1fb/0x318 [ 1368.645862][T31164] should_fail+0x555/0x770 [ 1368.645880][T31164] __should_failslab+0x11a/0x160 [ 1368.653480][T31164] ? ksys_mount+0x6a/0x100 [ 1368.653493][T31164] should_failslab+0x9/0x20 [ 1368.653505][T31164] __kmalloc_track_caller+0x79/0x340 [ 1368.653520][T31164] strndup_user+0x76/0x130 [ 1368.653530][T31164] ksys_mount+0x6a/0x100 [ 1368.653547][T31164] __x64_sys_mount+0xbf/0xd0 [ 1368.653563][T31164] do_syscall_64+0xf7/0x1c0 [ 1368.653578][T31164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1368.700747][T31164] RIP: 0033:0x45d08a [ 1368.704639][T31164] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1368.724249][T31164] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1368.732662][T31164] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1368.740629][T31164] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1368.748608][T31164] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1368.756612][T31164] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1368.764593][T31164] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1368.990057][T31051] XFS (loop3): Invalid superblock magic number 11:05:57 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd6, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='\x00\x00\x00\t\x00', 0x410002, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r1, 0x3b72, &(0x7f0000000140)={0x20, 0x2, 0x3, 0x7fff}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xa77affa7c6d39ea, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00007e6000)={@multicast2, @loopback}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x34) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:05:57 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x700}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:57 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x9) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a80000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600030000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed480000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000042adf84f58572d5f0000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74dbf80000"], 0x444}}, 0x0) fdatasync(r3) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb139, 0x0, 0x0, 0x0, 0x1}, [@func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f0000000140)='GPL\x00', 0xffff8000, 0x0, 0x0, 0x40f00, 0xd, [], r4, 0x54aad7c8ff2d4421, r0, 0x8, &(0x7f0000000180)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xd, 0x80000000, 0x10000}, 0x10}, 0x70) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000280)=r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000000)={r7}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000080)=r7, 0x4) r8 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) r9 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r9, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r9, 0x800000c0045009, &(0x7f0000000180)) ioctl$IMGETVERSION(r9, 0x80044942, &(0x7f0000000480)) ioctl$int_in(r8, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r8, 0x800000c0045009, &(0x7f0000000180)) ioctl$KVM_GET_FPU(r8, 0x81a0ae8c, &(0x7f00000002c0)) 11:05:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x500]}) 11:05:57 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1369.361946][T31180] fuse: Invalid rootmode [ 1369.376821][T31183] fuse: Invalid rootmode [ 1369.409328][T31179] FAULT_INJECTION: forcing a failure. [ 1369.409328][T31179] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.422703][T31179] CPU: 0 PID: 31179 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1369.431370][T31179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.441461][T31179] Call Trace: [ 1369.444771][T31179] dump_stack+0x1fb/0x318 [ 1369.449131][T31179] should_fail+0x555/0x770 [ 1369.453564][T31179] __should_failslab+0x11a/0x160 [ 1369.458505][T31179] ? __sigqueue_alloc+0x2ce/0x440 [ 1369.463531][T31179] should_failslab+0x9/0x20 [ 1369.468021][T31179] kmem_cache_alloc+0x56/0x2e0 [ 1369.468034][T31179] __sigqueue_alloc+0x2ce/0x440 [ 1369.468046][T31179] __send_signal+0x508/0xcd0 [ 1369.468066][T31179] send_signal+0x6e0/0x830 [ 1369.486630][T31179] force_sig_info_to_task+0x247/0x2e0 [ 1369.492017][T31179] force_sig_fault+0xbf/0x130 [ 1369.496728][T31179] __bad_area_nosemaphore+0x307/0x470 [ 1369.502103][T31179] bad_area+0x6b/0x80 11:05:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x600]}) [ 1369.506088][T31179] do_user_addr_fault+0xacc/0xaf0 [ 1369.511115][T31179] __do_page_fault+0xd3/0x1f0 [ 1369.515784][T31179] do_page_fault+0x99/0xb0 [ 1369.520199][T31179] page_fault+0x39/0x40 [ 1369.524343][T31179] RIP: 0033:0x45423f [ 1369.528229][T31179] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 1369.547832][T31179] RSP: 002b:00007f1d3e743a88 EFLAGS: 00010283 11:05:57 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x900}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1369.553897][T31179] RAX: 00007f1d3e743b40 RBX: 0000000020000268 RCX: 0000000000000000 [ 1369.561872][T31179] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f1d3e743b40 [ 1369.569845][T31179] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 1369.577818][T31179] R10: 0000000000000075 R11: 00000000004e7c00 R12: 0000000000000004 [ 1369.585791][T31179] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:57 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0x4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={r3, 0x1c, &(0x7f00000001c0)=[@in6={0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}]}, &(0x7f0000000240)=0x10) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r4, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r4, 0x800000c0045009, &(0x7f0000000180)) r5 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x8, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r7, 0x105, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, '\nxcan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r5, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x9951795c8a7f7859}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r7, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x8000, @link='syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40508c0}, 0x40000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r4, 0xc0045540, &(0x7f0000000040)=0xfff) [ 1369.622958][T31186] XFS (loop3): Invalid superblock magic number 11:05:57 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x700]}) 11:05:57 executing program 4: ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)=0x2) r2 = socket$rds(0x15, 0x5, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) accept$alg(r3, 0x0, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0x919c0ca7a41e5eda) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000000)={0x9, [0x3, 0x9, 0x1, 0x4, 0x7fff, 0x7, 0x1, 0x5ee0, 0xff, 0x1, 0x1, 0x81, 0x5, 0x313, 0x401, 0x400, 0x9, 0xfff8, 0x9, 0x1, 0x9, 0xfff, 0x1, 0x1, 0x9, 0xfff, 0x9, 0x3, 0x0, 0x2, 0x7, 0x9, 0x0, 0x7, 0x8, 0x9, 0x800, 0xcff, 0x0, 0x0, 0x9be7, 0x20, 0x2, 0x81, 0x9, 0xe69, 0x1ad, 0x4], 0xb}) r4 = socket$rds(0x15, 0x5, 0x0) dup(r3) bind$rds(r4, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x0, 0x0) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) sync_file_range(r4, 0x8, 0x5, 0x1) [ 1369.692317][T31196] tipc: Enabling of bearer rejected, failed to enable media [ 1369.766575][T31198] fuse: Invalid rootmode 11:05:57 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1369.802466][T31254] fuse: Invalid rootmode [ 1369.920140][T31305] FAULT_INJECTION: forcing a failure. [ 1369.920140][T31305] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.936763][T31305] CPU: 1 PID: 31305 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1369.945484][T31305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1369.955565][T31305] Call Trace: [ 1369.958861][T31305] dump_stack+0x1fb/0x318 [ 1369.963200][T31305] should_fail+0x555/0x770 [ 1369.967616][T31305] __should_failslab+0x11a/0x160 [ 1369.972552][T31305] ? getname_flags+0xba/0x640 [ 1369.977229][T31305] should_failslab+0x9/0x20 [ 1369.981725][T31305] kmem_cache_alloc+0x56/0x2e0 [ 1369.986485][T31305] getname_flags+0xba/0x640 [ 1369.990992][T31305] user_path_at_empty+0x2d/0x50 [ 1369.995846][T31305] do_mount+0xd7/0x2510 [ 1370.000087][T31305] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1370.005662][T31305] ? copy_mount_options+0x5f/0x3c0 [ 1370.010769][T31305] ? __kasan_check_read+0x11/0x20 [ 1370.015788][T31305] ? copy_mount_options+0x308/0x3c0 [ 1370.020980][T31305] ksys_mount+0xcc/0x100 [ 1370.025218][T31305] __x64_sys_mount+0xbf/0xd0 [ 1370.029812][T31305] do_syscall_64+0xf7/0x1c0 [ 1370.034314][T31305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.040197][T31305] RIP: 0033:0x45d08a [ 1370.044083][T31305] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1370.063681][T31305] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1370.072083][T31305] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1370.080050][T31305] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1370.088025][T31305] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1370.095989][T31305] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1370.103954][T31305] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:58 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd7, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:58 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:58 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x900]}) 11:05:58 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x4002, 0x0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000000)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r4, 0x3}, &(0x7f00000000c0)=0x8) 11:05:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608dcb7a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x80007ff}, 0x4}) 11:05:58 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1370.356810][T31319] fuse: Invalid rootmode 11:05:58 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xa00]}) 11:05:58 executing program 4: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x81a62eaa0ec1e7a7, "5a4ebad205a0157597ba59fd008000"}) [ 1370.377167][T31323] fuse: Invalid rootmode 11:05:58 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xb00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1370.419741][T31320] FAULT_INJECTION: forcing a failure. [ 1370.419741][T31320] name failslab, interval 1, probability 0, space 0, times 0 [ 1370.451883][T31320] CPU: 1 PID: 31320 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1370.460597][T31320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.470658][T31320] Call Trace: [ 1370.473953][T31320] dump_stack+0x1fb/0x318 [ 1370.478286][T31320] should_fail+0x555/0x770 [ 1370.482704][T31320] __should_failslab+0x11a/0x160 [ 1370.487638][T31320] ? ksys_mount+0x38/0x100 [ 1370.492050][T31320] should_failslab+0x9/0x20 [ 1370.496545][T31320] __kmalloc_track_caller+0x79/0x340 [ 1370.501829][T31320] strndup_user+0x76/0x130 [ 1370.506244][T31320] ksys_mount+0x38/0x100 [ 1370.510498][T31320] __x64_sys_mount+0xbf/0xd0 [ 1370.515085][T31320] do_syscall_64+0xf7/0x1c0 [ 1370.519587][T31320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.525474][T31320] RIP: 0033:0x45d08a [ 1370.529362][T31320] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1370.548962][T31320] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1370.557367][T31320] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1370.565331][T31320] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1370.573296][T31320] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1370.581259][T31320] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1370.589220][T31320] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:05:58 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/d\a\x00/dsp#\x00', 0x28004, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040)=0x5d, 0x4) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000000c0)) [ 1370.620940][T31332] fuse: Invalid rootmode 11:05:58 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1370.664289][T31332] fuse: Invalid rootmode [ 1370.669453][T31326] XFS (loop3): Invalid superblock magic number 11:05:58 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1370.795336][T31442] FAULT_INJECTION: forcing a failure. [ 1370.795336][T31442] name failslab, interval 1, probability 0, space 0, times 0 [ 1370.814050][T31442] CPU: 0 PID: 31442 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1370.822761][T31442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1370.832819][T31442] Call Trace: [ 1370.836114][T31442] dump_stack+0x1fb/0x318 [ 1370.840450][T31442] should_fail+0x555/0x770 [ 1370.844873][T31442] __should_failslab+0x11a/0x160 [ 1370.849813][T31442] ? tomoyo_encode2+0x273/0x5a0 [ 1370.854662][T31442] should_failslab+0x9/0x20 [ 1370.859162][T31442] __kmalloc+0x7a/0x340 [ 1370.863322][T31442] tomoyo_encode2+0x273/0x5a0 [ 1370.868012][T31442] tomoyo_realpath_from_path+0x769/0x7c0 [ 1370.873733][T31442] tomoyo_mount_permission+0x294/0xa30 [ 1370.879195][T31442] ? filename_lookup+0x4b0/0x690 [ 1370.884138][T31442] ? kmem_cache_free+0xd8/0xf0 [ 1370.888926][T31442] tomoyo_sb_mount+0x35/0x40 [ 1370.894070][T31442] security_sb_mount+0x84/0xe0 [ 1370.898835][T31442] do_mount+0x10a/0x2510 [ 1370.903082][T31442] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1370.908630][T31442] ? copy_mount_options+0x5f/0x3c0 [ 1370.913747][T31442] ? copy_mount_options+0x308/0x3c0 [ 1370.916749][T31448] fuse: Invalid rootmode [ 1370.918973][T31442] ksys_mount+0xcc/0x100 [ 1370.927432][T31442] __x64_sys_mount+0xbf/0xd0 [ 1370.932042][T31442] do_syscall_64+0xf7/0x1c0 [ 1370.936556][T31442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1370.942442][T31442] RIP: 0033:0x45d08a [ 1370.946335][T31442] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1370.965949][T31442] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1370.974360][T31442] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1370.982326][T31442] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1370.990303][T31442] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1370.998267][T31442] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1371.006250][T31442] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1371.021951][T31442] ERROR: Out of memory at tomoyo_realpath_from_path. 11:05:59 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10a, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:05:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xb00]}) 11:05:59 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:05:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) clone3(&(0x7f00000004c0)={0x44800, &(0x7f0000000300)=0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000140), 0x4, 0x0, &(0x7f00000003c0)=""/20, 0x14, &(0x7f0000000400)=""/160}, 0x40) getpid() socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) ioctl$VIDIOC_G_STD(r2, 0x80085617, &(0x7f00000000c0)) fcntl$getflags(r1, 0x408) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000040)=0xb2a) 11:05:59 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xd00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:05:59 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1371.547364][T31460] FAULT_INJECTION: forcing a failure. [ 1371.547364][T31460] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1371.560637][T31460] CPU: 0 PID: 31460 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1371.569310][T31460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1371.579372][T31460] Call Trace: [ 1371.582679][T31460] dump_stack+0x1fb/0x318 [ 1371.587022][T31460] should_fail+0x555/0x770 [ 1371.591587][T31460] should_fail_alloc_page+0x55/0x60 [ 1371.596788][T31460] prepare_alloc_pages+0x283/0x460 [ 1371.601909][T31460] __alloc_pages_nodemask+0xb2/0x5d0 [ 1371.607299][T31460] ? __kasan_kmalloc+0x178/0x1b0 [ 1371.612250][T31460] kmem_getpages+0x4d/0xa00 [ 1371.616755][T31460] cache_grow_begin+0x7e/0x2c0 [ 1371.621522][T31460] cache_alloc_refill+0x311/0x3f0 [ 1371.626547][T31460] ? check_preemption_disabled+0xb7/0x2a0 [ 1371.632269][T31460] kmem_cache_alloc+0x2b9/0x2e0 [ 1371.637125][T31460] ? getname_flags+0xba/0x640 [ 1371.641794][T31460] getname_flags+0xba/0x640 11:05:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xc00]}) [ 1371.646295][T31460] user_path_at_empty+0x2d/0x50 [ 1371.651151][T31460] do_mount+0xd7/0x2510 [ 1371.655311][T31460] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1371.660855][T31460] ? copy_mount_options+0x5f/0x3c0 [ 1371.665970][T31460] ? __kasan_check_read+0x11/0x20 [ 1371.670993][T31460] ? copy_mount_options+0x308/0x3c0 [ 1371.676193][T31460] ksys_mount+0xcc/0x100 [ 1371.678694][T31465] fuse: Invalid rootmode [ 1371.680437][T31460] __x64_sys_mount+0xbf/0xd0 [ 1371.680451][T31460] do_syscall_64+0xf7/0x1c0 [ 1371.680467][T31460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1371.693762][T31460] RIP: 0033:0x45d08a [ 1371.693773][T31460] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1371.693778][T31460] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1371.693787][T31460] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a 11:05:59 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000059c0)=ANY=[@ANYBLOB="58000000000000001401000008000000000000000000010001000000000000000000000000000000000000000000000000000000000000000000007e30df34538329ea000000000000000000000000000000000000000000555ab7426f3e7d8f4336d33939576ec304e42a7933f5f4143af54aa6045c8314b6ac412881c122cbe81e892299200fc6f1bab84d56df4919532c9bfdf0ced198976ed23bc4ff96ea3f254c416a7009734cd37dbd7953153396498c77a1e039f2076d43241f05d4081255ef0a5926c2e19b9a83c06d192da18a6dec6187e3de56d1e8a76257990393c2c609895ac9ecdb5425b1e95602d9855270f698910bae51a06c62e37acd37f400000000"], 0x58}, 0x0) sendmmsg$sock(r0, &(0x7f00000057c0)=[{{&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @remote}, 0x1, 0x4, 0x1}}, 0x80, &(0x7f0000001280)=[{&(0x7f0000000140)="61f856910c1f0d39dd51ecc2e8979cb8ce731ff0011a28fedea6ef7a8979e70cc56f1ab77d8b0e0a1b8503a8c22091ee1f2ccf2675d2f6a4f521012b327c12f2b7aa960e07f00c20373e1abcf54e08031a121de2da2b7485effa3d1b5938a6e6af45d69971dee963b3", 0x69}, {&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="29c427c8b753feb2812e0a9dc0ab3ea6c501febb3370583dcb6409fd93009f84c972e9fa15d433e7d06374e4c88b3660281e8da1022db49d7395cd9e6e95902f116cb48ccff1b32a4f9546ce40ee0a175d2db5026b98632be4c299800c2ade0991430cd3d824a0a7b03ac4264de84b137c2433877487c77d5c539b38c7d816a2d14ce0642baa2f5ebe1bcef3dc090df12873a86f55cfd6c47930c0", 0x9b}, {&(0x7f00000000c0)="ab", 0x1}], 0x4, &(0x7f00000012c0)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x613}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}], 0x48}}, {{&(0x7f0000001340)=@nl=@kern={0x10, 0x0, 0x0, 0x100000}, 0x80, &(0x7f0000001880)=[{&(0x7f00000013c0)="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", 0xff}, {&(0x7f00000014c0)="b5eea85c122cc2d78c4ad3b9da09553fc9131491b4c243e931433bec0152c7d3a8bc6cf46006f0a6f7322ec8415084defda379a8a60e423a926cfb79f88431f777c3c377717c8573df80dc788ee892f2e734042437ba77c91f68a7967b33b3994b2c247ad55e0d3b0ac616620938a2e17292dca4b6448b9a93d9badaa049cad35acc1a8457e240edffff8a36e8abd6eea8d830dfc3885b324ee2639cb8cdbf90e522106abc63a52fb809f1d5ff5e44e85548a4254bc135ff54a1d1fa7a59a1da5be5a3b70b795c2238c9e684ed44245856ebc978bba53d965a8a39c29eff77d05e456f9261c1", 0xe6}, {&(0x7f00000015c0)="fd5a205a5b6c333df5479b5d00b456098b8e5a88aefd555f9eb749be56a0f53471f766652fc83b6e7d6b05afad648ab0a3eda406ba6e80eaf872d3ac82b61ff23f346460a9c21da37e80e62420c44ea8a2d41e6eb0abd7e7da82d1118e8f32213d8cb24706819f1a20ab6f526bbe401188307078fe81ddf8b6655c15b71cc168a450bec74182252b6400201f718e7de97fc9512d82d7d65c6385d441c4e2c4a80744b531d9efb14bfacf", 0xaa}, {&(0x7f0000001680)="4116b2612ec6b01d7a9914efa6811c2e7ef2fcc3f455bfb998922138e7badb713967f4f88ff84813f5a21349e32a4b9e142a472ba04c170d4af169572676b0ed0bd40bcfbe9f4b59904e4b9c9e09ca688eb35dcd7ee0b977919c2f48d3c89ad1ced06fbafbbaaa10415c9a98dcffd4ca54b6a33a93fd014d35ae104646bcc11803347c9040afe9bb58ff6872a343a4d7725e9361d5388f072700c62dc4ed09903ea9", 0xa2}, {&(0x7f0000001740)="dbcd294f54395a19e71a6eff70d271e77547ebeba9e6805e144bb9d9b5160b7e88f30fed378dc37cbd9c15434b8be4420a7acd3d4af10d48191f58a14e04a49152118f152be198586126101785af18480aa2b261d579d60b2ce383ff7531a3803c3a63d067740f7240710a16", 0x6c}, {&(0x7f00000017c0)="d9bdae420f62cd1813dd3b94f79d5aa35a6f887253e3be46b2bc18e9ad442d0b5b9830eaf56834f0ee996ed639a70402054095e2e1a4bd83db7d59f0da0ad49605a74a214838277b7c6191259bdc96c16937ae790776be3fb2902c3f0087da6190fa18eef896a53ebd28c009c9a85874340d57a3279194b3fe52351e3a3cfd62152ef30d14aeeb32ea5fe9e26dcd", 0x8e}], 0x6, &(0x7f0000001900)=[@mark={{0x14, 0x1, 0x24, 0x4}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}, @timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x101}}], 0x78}}, {{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001980)="404a479dc91d6bebaf0d270e71e3b7bb4a5bb4f9c82c6b009ff3ee788948c4e84e284364e1f59cd578948d3908f2fcd3acb8a9627e7c82ea5fc0288337b7bb4d8948affb", 0x44}], 0x1}}, {{0x0, 0x0, &(0x7f0000002bc0)=[{&(0x7f0000001a40)="bd56c843bc03eb871f7ec4ac304b27a9c7fe51bb302008193375299558565f41ab6221b10b987f48bf66d22da66797c3f75d881b08c052cbb9c52f5e519ae1af48b8371985942d9f8d7860209a078c6c025cb6c5c5bb5c28cdfd988f0f1797a08a1628f1460b28afa6f98e0265a7f57f6a59d80e0e910ce0886808c6d53411d3f8c04c1ba19490e8ba2aaf3f41f3460cbc016188845c5f4a893bb5c87796cb9b67addeebc9a307ce18fe5af77cdf24a4a178", 0xb2}, {&(0x7f0000001b00)="96f6252680cb403b8568438f5ecdbd59f350918d598b356f202b9e68bd5b9f0fbbb2ce583c6d03de5e3255c4b0194fece814550751eb85db7edb4bfa14d61b4b28e513c24998eb815b323110f97fa2a6f66fc80e10f2d69428cd2c304549d730f490ae04dd1bd9ef7cd60bebd2781ef97a1216614d948237", 0x78}, {&(0x7f0000001b80)="d3fd74", 0x3}, {&(0x7f0000001bc0)="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", 0x1000}], 0x4}}, {{&(0x7f0000002c00)=@nl=@kern={0x10, 0x0, 0x0, 0x10008}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000002c80)="1860cfc869518ffb1472adebea19db17dc49be9d82e9e4bba67b54d159ad5aa4cd93cbf19d549892df06192a18de59e499f09afd4289a3923eeef9234f231f0c113e679901a3c42936f9376de9cd4fcec7ee78411298dd48dad5a0430009f52b31725122905a24985dbe8a7b0d9a712807d13a9dd7b2d1c39ad33b32bc55501a487b382089977e8946e0026c8e116c3c69e8d03333393bd0b7f1941138cbfc90b18938069dbc3a791b8aec671d1fa0c3e111f4b5857da886163a", 0xba}, {&(0x7f0000002d40)="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", 0x1000}, {&(0x7f0000003d40)="424e269d3b099be1c83daeb4beedbe517d3ebfb11c71cc3b35ce", 0x1a}], 0x3}}, {{&(0x7f0000003dc0)=@ipx={0x4, 0x9, 0x0, "0f5a1d701d5a", 0x1}, 0x80, &(0x7f0000005200)=[{&(0x7f0000003e40)="2b60244c6bc0034b3047960f81c2e7de8f4bf8b0868605cc5fb09470a81570f38f54b03d1f258572b10393ffe248b6f56446520160ff4032b8f96b0d6012b9cea1e086b375578ac6cd8b6c786578b6eb6cad89127826a13954b68266b63d9c0c636a71b76d98886ded2297444807f75d3f8591d647369c930eaaf14fd75eba3bea09b9db086386eb1aaa5faa0f9214055d15e0adb07df94351d912eb16648e0f79ed41711a351f8b74740790e6317e7cbab6c6472b20016fbf", 0xb9}, {&(0x7f0000003f00)="d491fdfe17ef21d61a426afddcdcb3fac3054c3741b967fe1c2bc3aaafc34afda652fc713860fcb5dc", 0x29}, {&(0x7f0000003f40)="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", 0x1000}, {&(0x7f0000004f40)="05c57603d621961bdb6ffd85196f7138c238992224c2609856f9892dc9354c1a31f3ce8a8567b0b6d953fec14f4ad54e77482a8d6e30368d4e22c0d9a2b0facac0166b3d20291bec6c1b9ff1e155d56472576ea6347f5d58fae105fef6228e489fc65612b20dfbd2e11e04c7a85b83f1e4868ad19d5d1f3b4f18317d884211ee5cd7470d", 0x84}, {&(0x7f0000005000)="48e09d47f6a8c21e9c7f746ca12b86161b385bc4b7a93006359e910fc6ba517ca489164b7e625c0497269e43", 0x2c}, {&(0x7f0000005040)="af61675f4df0b01052e674c168b7c8a87af825a514e772a93ea4acbdc61d4fe43a4f813dc75a344b2c09b58cf1740cbf1898ca4c59587fe15bf0ee6022f12d7af6c43ea0ceb265cb060281e03c682bf8", 0x50}, {&(0x7f00000050c0)="fedff843a8d44a5da1e93690243fcd356c2378cfff309d3b21250f25a5c5c4dfc1bd387aea99379d3e069ae03b300ac8548746e254e4a0d49f45a21733e0499e9fa140161018399f067ac545fb6f2dad", 0x50}, {&(0x7f0000005140)="4b1da82acdec6ed3d2867e24d3dcd4aabcb4df9626307db3897b550f20c32e21d99cd5f06c02b668671afb53dc0cfa890bfcbf621e7307557228bfa0972f22ca925ba6e11e9fcb30bbfb35621b7daf6f11be3fa1fab3c108b2fd9b2529691cd93355a1f09fc49e4ce61b56e77943f042130068380a3e233fe6f34286a28bf9f719cdcf56fa16fcb623e1bf56a6d9b5cff553f14b27c883ee3fc5bea3401ac2", 0x9f}], 0x8}}, {{&(0x7f0000005280)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @empty}}, 0x80, &(0x7f0000005500)=[{&(0x7f0000005300)="02b2328dc6ab6e74485f58b62c94ab3f73623fd317f9d72c", 0x18}, {&(0x7f0000005340)="d89d79b31f3fdd728ba2b7a8e42e237e31fc8651a72c1dae30c65a630ca008889ac7111a58bdf4a73d7dbb941dff160950e7dc164b9cab0e300ebd566b62660f9295321fd51e5c099de008ce108af4bb021a39322e631f857e6baeeb4c38969025999ea74a759ce59d3905c6807889b1287e8d152bbb3621041f68bf18388d45ffb018542f44217ca592a006df6750c57415aecf7d442d30c534b64686772a953baa0557a5ffaac0788524efc40f524c037f133c2224e9", 0xb7}, {&(0x7f0000005400)="38694eca67b7273c39fdf8b26b915f00fc898fdc378e3e40bc6a47b98c992544b16447b07600ee8b9cdc52bb1ba666a4a04ad72fd908635d1b7e7cbe179aa436044f1b320f7da79a67e42d7c3abd741f43038cb89e3ac497b6127d6b9836f26cfda797455115acacf24b9048fad014fbcd5ce5ecdc71b493e87a6a569cecebe65105f1bfe94c997527a94bb7c023dd2f3e5b928c877634385af6ff96db94838879406c4e908f9c3e4a44fa83ea6667d24f4ebfec7d38a85879e7", 0xba}, {&(0x7f00000054c0)="ddfcad523f6686f34ff723edbac2b4d3d56d22c8938d05", 0x17}], 0x4, &(0x7f0000005540)=[@mark={{0x14, 0x1, 0x24, 0x8001}}, @mark={{0x14, 0x1, 0x24, 0x40}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0xa8}}, {{&(0x7f0000005600)=@ax25={{0x3, @default, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null]}, 0x80, &(0x7f0000005700)=[{&(0x7f0000005680)="daa31d409d83429e40413bdbe294b1d665cd7ae6a2030b4ec3e609e1845595ab5eba660cd855155319ef57a0a22008b70eb471055a4a312ec6a0885abe8a07320ab2c8108f2a553c8c7a8a565953982e81e3bf8e10da10518b0126974e1946fe8e1d", 0x62}], 0x1, &(0x7f0000005740)=[@mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x1000000}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x78}}], 0x8, 0x200400c0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xfffffffd}, 0x1}) 11:05:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac66009e17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x2}}) socket$bt_cmtp(0x1f, 0x3, 0x5) 11:05:59 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xd00]}) [ 1371.693792][T31460] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1371.693797][T31460] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1371.693802][T31460] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1371.693807][T31460] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1371.753082][T31473] fuse: Invalid rootmode 11:05:59 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) setsockopt$SO_J1939_PROMISC(r0, 0x6b, 0x2, &(0x7f00000000c0), 0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x5c4c0, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) ioctl$PPPIOCATTACH(r3, 0x4004743d, &(0x7f0000000200)) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f00000001c0)=0x1) 11:05:59 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1371.902845][T31528] XFS (loop3): Invalid superblock magic number [ 1371.975760][T31588] fuse: Invalid rootmode [ 1371.991534][T31589] fuse: Invalid rootmode 11:06:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x164, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:00 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:00 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe00]}) 11:06:00 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4002}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:00 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000000)={r4}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={r4, 0xf3, "cd6b03fbd12ab908c01d2e1c23e054947572cc59e7bf3c33a7d6b8aafa26542df97972583f79421ca4b2fa794f4cd22d17dac7bb9ced9d55b341b84f89f3f44119e1e8fdbbb8f186a47c4463db781eacf7e7f053191b18535c1ea0d5fb55139519e19f07b27d2773e091891d6f6e4405df7ceb44071db71cab0926e926cb819ca488cced533986c28b1050bccc3c9afa3b90e3ef24b6d72290e8c68776395d9bcfbdf1200e85ebdf3ab5d75d9b8000dbcf3c857a7c75879316b054f95871182af8ca2a992c64212fe52384876f3676e8da214d11d5f4c99529eb8bb201fe01db1bff1007b109110aa3d621c49304ab38076a1f"}, &(0x7f0000000040)=0xfb) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r5, 0x7ff, 0x4, [0x8, 0x4, 0xcc0, 0x80]}, &(0x7f00000000c0)=0x10) [ 1372.567663][T31607] /dev/loop0: Can't open blockdev [ 1372.569929][T31602] FAULT_INJECTION: forcing a failure. [ 1372.569929][T31602] name failslab, interval 1, probability 0, space 0, times 0 [ 1372.574898][T31608] /dev/loop0: Can't open blockdev [ 1372.611753][T31602] CPU: 1 PID: 31602 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1372.620464][T31602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1372.631998][T31602] Call Trace: [ 1372.635292][T31602] dump_stack+0x1fb/0x318 [ 1372.639633][T31602] should_fail+0x555/0x770 [ 1372.644052][T31602] __should_failslab+0x11a/0x160 [ 1372.644066][T31602] ? getname_kernel+0x59/0x2f0 [ 1372.644076][T31602] should_failslab+0x9/0x20 11:06:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1100]}) 11:06:00 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={@remote={[], 0x1}, 0xe, 'ip6gretap0\x00'}) [ 1372.644084][T31602] kmem_cache_alloc+0x56/0x2e0 [ 1372.644095][T31602] getname_kernel+0x59/0x2f0 [ 1372.644106][T31602] kern_path+0x1f/0x40 [ 1372.644121][T31602] tomoyo_mount_permission+0x7f1/0xa30 [ 1372.663046][T31602] ? kmem_cache_free+0xd8/0xf0 [ 1372.663081][T31602] tomoyo_sb_mount+0x35/0x40 [ 1372.663093][T31602] security_sb_mount+0x84/0xe0 [ 1372.663107][T31602] do_mount+0x10a/0x2510 [ 1372.663117][T31602] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1372.663128][T31602] ? copy_mount_options+0x5f/0x3c0 [ 1372.681954][T31602] ? copy_mount_options+0x308/0x3c0 [ 1372.681969][T31602] ksys_mount+0xcc/0x100 [ 1372.681982][T31602] __x64_sys_mount+0xbf/0xd0 [ 1372.681997][T31602] do_syscall_64+0xf7/0x1c0 [ 1372.682012][T31602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1372.682021][T31602] RIP: 0033:0x45d08a [ 1372.682030][T31602] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 11:06:00 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1200]}) [ 1372.682035][T31602] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1372.682044][T31602] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1372.682052][T31602] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1372.691367][T31602] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1372.691374][T31602] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1372.691380][T31602] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:00 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = socket$xdp(0x2c, 0x3, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f0000001140)={0x1, 0x2, 0x1000, 0x44, &(0x7f0000000040)="5d2aa77ebbbf30d1ea6b754e011d0f9bf213a05874deb3e395357402c3894b83e9604363b4ab26f2cf68ddd42ac999a78e57a21ccaef819dd3c1685d409e7ca916863398", 0x10e7, 0x0, &(0x7f0000000140)="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"}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f00000011c0)={{0x2, 0x4e22, @broadcast}, {0x306, @broadcast}, 0x2, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}, 'ip6erspan0\x00'}) [ 1372.857569][T31718] /dev/loop0: Can't open blockdev 11:06:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1400]}) [ 1372.884116][T31721] /dev/loop0: Can't open blockdev 11:06:00 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1e4, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:00 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:00 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:00 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/d0\x01\x81u0\x05#\\', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:00 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1e00]}) [ 1373.069985][T31734] /dev/loop0: Can't open blockdev [ 1373.073596][T31736] FAULT_INJECTION: forcing a failure. [ 1373.073596][T31736] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1373.089393][T31736] CPU: 0 PID: 31736 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1373.089400][T31736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.089404][T31736] Call Trace: [ 1373.089423][T31736] dump_stack+0x1fb/0x318 [ 1373.089438][T31736] should_fail+0x555/0x770 [ 1373.089454][T31736] should_fail_alloc_page+0x55/0x60 [ 1373.089463][T31736] prepare_alloc_pages+0x283/0x460 [ 1373.089476][T31736] __alloc_pages_nodemask+0xb2/0x5d0 [ 1373.089489][T31736] ? __kasan_check_read+0x11/0x20 [ 1373.089506][T31736] kmem_getpages+0x4d/0xa00 [ 1373.089519][T31736] cache_grow_begin+0x7e/0x2c0 [ 1373.089532][T31736] cache_alloc_refill+0x311/0x3f0 [ 1373.089542][T31736] ? check_preemption_disabled+0xb7/0x2a0 [ 1373.089554][T31736] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1373.089566][T31736] ? smack_d_instantiate+0xabf/0xd70 [ 1373.108455][T31736] smack_d_instantiate+0xabf/0xd70 [ 1373.176724][T31736] ? lockdep_init_map+0x2a/0x680 [ 1373.181832][T31736] security_d_instantiate+0xa5/0x100 [ 1373.187112][T31736] d_instantiate_new+0x65/0x120 [ 1373.191959][T31736] ext4_mkdir+0xfa9/0x1450 [ 1373.196391][T31736] vfs_mkdir+0x43f/0x610 [ 1373.200654][T31736] do_mkdirat+0x1d7/0x320 [ 1373.204992][T31736] __x64_sys_mkdir+0x60/0x70 [ 1373.209587][T31736] do_syscall_64+0xf7/0x1c0 [ 1373.214100][T31736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.219993][T31736] RIP: 0033:0x459a57 [ 1373.223883][T31736] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1373.243492][T31736] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1373.252779][T31736] RAX: ffffffffffffffda RBX: 0000000020000268 RCX: 0000000000459a57 [ 1373.260927][T31736] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 11:06:00 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x2500]}) 11:06:01 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x208000, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000140)={{{@in=@multicast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@loopback, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e24, 0x6, 0x4e20, 0xffff, 0x2, 0x40, 0xa0, 0x89, 0x0, r3}, {0x6, 0x1, 0x0, 0x2, 0x8, 0x0, 0x6, 0x80}, {0x8000, 0x5, 0x8000, 0xe55}, 0x1, 0x6e6bbc, 0x2, 0x1, 0x0, 0x3}, {{@in=@remote, 0x4d6, 0xb1}, 0x2, @in=@dev={0xac, 0x14, 0x14, 0xb}, 0x3505, 0x7, 0x3, 0x40, 0x8000, 0x5}}, 0xe8) 11:06:01 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1373.268907][T31736] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 1373.276896][T31736] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 1373.284864][T31736] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:01 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4005}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x3f00]}) 11:06:01 executing program 4: syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) 11:06:01 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x254, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1373.408198][T31751] /dev/loop0: Can't open blockdev 11:06:01 executing program 1: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) [ 1373.466568][T31758] /dev/loop0: Can't open blockdev 11:06:01 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4006}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:01 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x100, 0x3}) 11:06:01 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x4000]}) [ 1373.520375][T31753] XFS (loop3): Invalid superblock magic number [ 1373.608221][T31772] /dev/loop0: Can't open blockdev 11:06:01 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="22f84d4bf5463ca6456782817cce69b1d334fb8a98eb4a7e705bedfc6400be633c2af63e2a808c89df24e875567097d682c100cd80d55598dfa525c7dc5d7f6b62f611315fdc64bb68470a1d977161c9c90c54c1e032ca9778515550843b6320b658c170b1566fc9a132f23534", 0x6d}], 0x1, 0x8) [ 1373.643288][T31775] FAULT_INJECTION: forcing a failure. [ 1373.643288][T31775] name failslab, interval 1, probability 0, space 0, times 0 [ 1373.666754][T31777] /dev/loop0: Can't open blockdev [ 1373.687219][T31775] CPU: 0 PID: 31775 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1373.695931][T31775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1373.706034][T31775] Call Trace: [ 1373.709338][T31775] dump_stack+0x1fb/0x318 [ 1373.713678][T31775] should_fail+0x555/0x770 [ 1373.718191][T31775] __should_failslab+0x11a/0x160 [ 1373.723136][T31775] should_failslab+0x9/0x20 [ 1373.727637][T31775] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1373.727649][T31775] ? copy_mount_options+0x5f/0x3c0 [ 1373.727664][T31775] copy_mount_options+0x5f/0x3c0 [ 1373.738054][T31775] ksys_mount+0xa0/0x100 [ 1373.738068][T31775] __x64_sys_mount+0xbf/0xd0 [ 1373.738087][T31775] do_syscall_64+0xf7/0x1c0 [ 1373.756334][T31775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1373.762256][T31775] RIP: 0033:0x45d08a [ 1373.766151][T31775] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1373.785765][T31775] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 11:06:01 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000040)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={r2, 0x2}, &(0x7f0000000140)=0x8) 11:06:01 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5c00]}) 11:06:01 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4007}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:01 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x800) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000080)={0x7, 0x1, 0x2, @broadcast, 'erspan0\x00'}) [ 1373.794178][T31775] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1373.802149][T31775] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1373.810125][T31775] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1373.818101][T31775] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1373.826190][T31775] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:01 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1373.969435][T31885] /dev/loop0: Can't open blockdev [ 1374.002668][T31966] /dev/loop0: Can't open blockdev [ 1374.054715][T31995] FAULT_INJECTION: forcing a failure. [ 1374.054715][T31995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1374.067954][T31995] CPU: 1 PID: 31995 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1374.076627][T31995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.086684][T31995] Call Trace: [ 1374.089989][T31995] dump_stack+0x1fb/0x318 [ 1374.094331][T31995] should_fail+0x555/0x770 [ 1374.098750][T31995] should_fail_alloc_page+0x55/0x60 [ 1374.103945][T31995] prepare_alloc_pages+0x283/0x460 [ 1374.109059][T31995] __alloc_pages_nodemask+0xb2/0x5d0 [ 1374.114337][T31995] ? __kasan_kmalloc+0x178/0x1b0 [ 1374.119284][T31995] kmem_getpages+0x4d/0xa00 [ 1374.123788][T31995] cache_grow_begin+0x7e/0x2c0 [ 1374.128549][T31995] cache_alloc_refill+0x311/0x3f0 [ 1374.133936][T31995] ? check_preemption_disabled+0xb7/0x2a0 [ 1374.139655][T31995] kmem_cache_alloc+0x2b9/0x2e0 [ 1374.144930][T31995] ? getname_flags+0xba/0x640 [ 1374.149613][T31995] getname_flags+0xba/0x640 [ 1374.154116][T31995] user_path_at_empty+0x2d/0x50 [ 1374.158966][T31995] do_mount+0xd7/0x2510 [ 1374.163122][T31995] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1374.168659][T31995] ? copy_mount_options+0x5f/0x3c0 [ 1374.173767][T31995] ? __kasan_check_read+0x11/0x20 [ 1374.178781][T31995] ? copy_mount_options+0x308/0x3c0 [ 1374.184071][T31995] ksys_mount+0xcc/0x100 [ 1374.188309][T31995] __x64_sys_mount+0xbf/0xd0 [ 1374.192899][T31995] do_syscall_64+0xf7/0x1c0 [ 1374.197424][T31995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.204051][T31995] RIP: 0033:0x45d08a [ 1374.207947][T31995] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1374.227562][T31995] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1374.235992][T31995] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1374.243960][T31995] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1374.252111][T31995] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1374.260086][T31995] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1374.268052][T31995] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:02 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe7ff]}) 11:06:02 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) connect$can_bcm(r0, &(0x7f0000000080)={0x1d, r1}, 0x10) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) ioctl$KDGKBENT(r3, 0x4b46, &(0x7f00000000c0)={0x8, 0xc7, 0x5}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r5, 0x105, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, '\nxcan1\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28008000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r5, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='syz1\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x54044085}, 0x20000880) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x1}}) 11:06:02 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000000c0)=""/38) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:02 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4008}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:02 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1374.472283][T31999] tipc: Enabling of bearer rejected, failed to enable media [ 1374.524602][T32005] FAULT_INJECTION: forcing a failure. [ 1374.524602][T32005] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.532774][T32007] /dev/loop0: Can't open blockdev [ 1374.571918][T31999] tipc: Enabling of bearer rejected, failed to enable media [ 1374.580971][T32014] /dev/loop0: Can't open blockdev [ 1374.591772][T32005] CPU: 1 PID: 32005 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1374.600488][T32005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1374.600495][T32005] Call Trace: [ 1374.600517][T32005] dump_stack+0x1fb/0x318 [ 1374.600538][T32005] should_fail+0x555/0x770 [ 1374.600558][T32005] __should_failslab+0x11a/0x160 [ 1374.600575][T32005] ? tomoyo_encode2+0x273/0x5a0 [ 1374.618266][T32005] should_failslab+0x9/0x20 [ 1374.618279][T32005] __kmalloc+0x7a/0x340 [ 1374.618297][T32005] tomoyo_encode2+0x273/0x5a0 [ 1374.618312][T32005] tomoyo_realpath_from_path+0x769/0x7c0 [ 1374.651718][T32005] tomoyo_mount_permission+0x294/0xa30 [ 1374.657184][T32005] ? filename_lookup+0x4b0/0x690 [ 1374.662126][T32005] ? kmem_cache_free+0xd8/0xf0 [ 1374.666903][T32005] tomoyo_sb_mount+0x35/0x40 [ 1374.671487][T32005] security_sb_mount+0x84/0xe0 [ 1374.676247][T32005] do_mount+0x10a/0x2510 [ 1374.680484][T32005] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1374.686027][T32005] ? copy_mount_options+0x5f/0x3c0 [ 1374.691141][T32005] ? copy_mount_options+0x308/0x3c0 [ 1374.696339][T32005] ksys_mount+0xcc/0x100 [ 1374.700578][T32005] __x64_sys_mount+0xbf/0xd0 [ 1374.705163][T32005] do_syscall_64+0xf7/0x1c0 [ 1374.709669][T32005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1374.715559][T32005] RIP: 0033:0x45d08a [ 1374.719451][T32005] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1374.739051][T32005] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1374.747455][T32005] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1374.755421][T32005] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1374.763388][T32005] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 11:06:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xfdfd]}) [ 1374.771364][T32005] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1374.779334][T32005] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:02 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4009}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xffe7]}) 11:06:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x7) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) sendto$x25(r1, &(0x7f0000000140)="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", 0x1000, 0x0, &(0x7f0000000040)={0x9, @null=' \x00'}, 0x12) 11:06:02 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac660eb666733a803000000dc319ff3eec200"}) [ 1374.838085][T32010] XFS (loop3): Invalid superblock magic number [ 1374.849995][T32005] ERROR: Out of memory at tomoyo_realpath_from_path. 11:06:02 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1000000]}) [ 1375.005438][T32027] /dev/loop0: Can't open blockdev [ 1375.050334][T32031] /dev/loop0: Can't open blockdev [ 1375.200948][T32010] XFS (loop3): Invalid superblock magic number 11:06:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x328, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:03 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:03 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x800, 0x0) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x4, 0x80) 11:06:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'bcsh0\x00', 0x600}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000500)=[@in6={0xa, 0x4e24, 0x1ec0, @remote, 0xfff}, @in={0x2, 0x4e20, @rand_addr=0x4}, @in6={0xa, 0x4e22, 0x10000, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @in6={0xa, 0x4e20, 0x82, @ipv4={[], [], @empty}, 0x3}], 0x64) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="0199adf3", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f0000000000)={r6}, 0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000340)={0x0, 0x7f}, &(0x7f0000000380)=0x8) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f00000000c0)=@in={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000140)=[{&(0x7f00000001c0)="54ddc61ed7d1b34a5e5fec5130e6d21316a90768982c24b9f672e32856fb891be9403584eae39a0946029fafa4e6dabeb72a00202029388f844205986750d20172", 0x41}, {&(0x7f0000000240)="0fbcc37bb44fe5d94a8a1fd5ccc5595e39069645dcf4aba2d1fdd9a23389de6a7b309895d2dfc91c0761ef9baa980d56735a150f8a9f755d09e1de5359d1ab94bdb028236baf5fd116cd50d499199c78ad1db1cafcf1e74d02b4392f866678bd6a2efa12dc897d9aad5fe3df96383f33162e5e6fab5b677d0d9f1062902747954c098ade2d00cae19295f03ad651bc81d944f13c965a8aa7b0c98024de60b477324b5b958a74d24c6f4145f307767795ea54a44596b48494474625188dfb77161fcd9a2f4971c5c15cc8f2fadff444bf0fb8dc310d8de7004d88fb7f9ba72b5e460b7ae253", 0xe5}], 0x2, &(0x7f00000003c0)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x0, 0x10205, 0xffffffff, 0x1, 0x0, 0x44, 0xb1, r6}}, @init={0x18, 0x84, 0x0, {0x4, 0x400, 0x6, 0xfffd}}, @init={0x18, 0x84, 0x0, {0x40, 0x0, 0x20, 0x4}}, @init={0x18, 0x84, 0x0, {0x3, 0xfff7, 0x2f31, 0x81}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x8218, 0xffff, 0x1, r7}}], 0xc8, 0xb2ce87292d59ffa}, 0x40002) 11:06:03 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x400a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x2000000]}) [ 1375.642997][T32043] /dev/loop0: Can't open blockdev 11:06:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x3000000]}) [ 1375.696000][T32046] FAULT_INJECTION: forcing a failure. [ 1375.696000][T32046] name failslab, interval 1, probability 0, space 0, times 0 [ 1375.720174][T32074] /dev/loop0: Can't open blockdev [ 1375.731734][T32046] CPU: 1 PID: 32046 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1375.740462][T32046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1375.750625][T32046] Call Trace: [ 1375.753928][T32046] dump_stack+0x1fb/0x318 [ 1375.758281][T32046] should_fail+0x555/0x770 [ 1375.762711][T32046] __should_failslab+0x11a/0x160 [ 1375.767691][T32046] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1375.773412][T32046] should_failslab+0x9/0x20 [ 1375.777926][T32046] __kmalloc+0x7a/0x340 [ 1375.782086][T32046] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 1375.787817][T32046] tomoyo_realpath_from_path+0xdc/0x7c0 11:06:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x4000000]}) 11:06:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x2, "5a4e520033bac6608de1f3ee00"}) 11:06:03 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x400b}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:03 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000001480)='trusted.overlay.upper\x00', &(0x7f00000014c0)={0x0, 0xfb, 0x5d, 0x1, 0x4, "896ba31878255d3ae8811474231c28e0", "0c63ed0bb4d5a9688ba4a33365d75850084a3e223a206beaff192f9a1baa218aa27f14f95028f6f2afbab2e5be0ed5e1d32d04adb145a6097cd7dea4a25aef334b1d723820b642a0"}, 0x5d, 0x1) vmsplice(r1, &(0x7f0000001400)=[{&(0x7f0000000040)="2d4729d809939eb18230411a4560b688037f76b9256d72940661535f6fc98d35a56773a3538f5d7cf55a", 0x2a}, {&(0x7f0000000140)="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", 0xff}, {&(0x7f0000000080)="1ed337179d6d9d204976e54f4a0d569c8a58988acdd52a253c7bf44e43371ba07fd6f0fe887cfbb74c1a86d8695034de1dc84a4c7230e3a287fb6bb594171f9ac9cdea14fc1d6d2aad880cf267899136693230", 0x53}, {&(0x7f0000000240)="3d6977a4adfa5d3e49583ad980e96f3a9a5f07d042b59fef70aade04994f99a3588985bd69999574fc514534db827f4c5471dedcc8e73b5784dce58cc382f01cbf6bd4be799ce7f4e75890e15741d8d36dc6f0d5e65ff28f47d44ce18646e4ac93ddde15201fdcc8685fa374ac57ad7532a8419d85820a4c71c8a1ece10e81f14f4ed45a3e89c453ef1184cbab491ff5bccc0789e1810ae5527bc741393664da7259431df2a496516e3f422cee6a4b", 0xaf}, {&(0x7f0000000300)="ba4b9ff7e6a2", 0x6}, {&(0x7f0000000340)="55fd7af854950038bda51846d21610976f3c382aed4acbd1f1419e082f1d45cec7ffc8081c1aad397d5ca01dc906bce19c3f0372e0a277a9e84ecb245da4554030418d688b7aea1f0880a4f1663cd6cc68ff2a676c6e67a9dd2b2be74389446653a7eb9168ba9392d22966287d6069fced45ebad865cbfeb1717bb726b26d6ef34788e986d147badd0751b1a22fcdaf4eb55a8c9b12b092028c3973ea3909918bbd7074545ed4384edb15f365d98330a068cdd61cbc151a039bba505cc22877dbaa9ea9b0b47129c3f94f9317c9a16a7f5a8bf9a921c2e23ea6ac82514e4a00ef4b29558df83ba804cabecf0d38b2f68a6fa8ad29794fffb81389891ef6f7d5eec2160b7cba92bfee74becfe502b8425b8b902b1961e2c1b4d3f14b8236c67f5edf8401f530ad68c64624057c6c44fd4b40409806f85271c29f724298220b9e09e0ba0cd4c6acf47b284c1659eb1c3297848defa05acc4600558cbb14803c72e65f3ccff9192abe29d2c6f6202e4081a565230688d1f06ad18aa93b65c5b7d32463ab81b9028e3ba56ccabd29206f0a3da4875ab0598c203b9c3dca5ac58650d2405d858061ba2adcd2321d687fccb7399a44741e0a5f514c6a2504fa7087637a4552581ba54460f0ad25019011e68bc583c2836ef7d25ef6427cf51b55980a36b7798db5afdf1ec9c8651bd0d6d748265358a68c5a5748f66ac9d7c37a8d711efecdf36657573141ba01461fa4e12f20a44cfd5e974eac9836956397019cd7107c63af300e5f28759d70367a735f033a1361735db1f115f6ee66c26a9418b910eea69e4f2c9c8450fcd8d7698c262e6ce0857448a53241be7a96b64ebea631827f240339005e482051d9e9ec7589b376b9d1dba495d639d243b349f8047b2cf1a1e5b4c833b598309b9c85cbc193c197149ad98be07d2cc0922f10977e74620e567b00026f0b8ca845db443e18225ce0d4e6d44c76dc47fd9f90a655fcc631f1a8536b0fb7337c73d2ccbcdaf1104647d8f02abdd793f5e26c645bc40d70e9c34e6d5964b6b2af6648041f14d904d6cf813404a06631e1ab034c4f54da6852f5a6c7bd05608296140c5e2fb146ab2dd9dcd4eaaf7b716accfc0a5e18382cccc9bf4e0db1cfc102a5d7d9bd2d387c1c219c661cd102f08ddf122fc174b4844e5e5378ef6b9959f5e0b5ad640b1d9aa318b98bd0179f2c54a7ea75e7de515214f082fbf22edb5510c66d3a7bc90700f1bd12aa4d751bd2132c11ad5c20a2f4e882fabbc70c51feac8ff6593fa63d01b66d4249fcad2ab57827a2ee34b7d76fada251216fa038e4e8450ca8890ba3a11be68c362b6adeb51bd22500ffc46a8b18ac1da4dfed7725062ab495c0c4967e7b9714aedc3d001205072d1e327292c434a9e36ab93d4c133962bd299d7c2317be8e5a992db2f0d6fe4b94126ee49b39d7272d06c4765a811ec3dd10a4cf219191ed3a1ad5b754b1cef0491148a038aa25733c34e08ff3ec6217f20daa700eb3e2509c42bd05841ec75512ccf502c542a2c3ab1a1bbcb011ca56343df0985c0caa91b70a0549c2d25050aa8d70ee888eb991e6acf2376ec07e1ea930959ccf8072b94d704a996d87fd575bd0d18d55de116e20c1da5bc44447b09c4817df7fb62f0bf46e19890d77f58ae6c8b3d3cee612a513e0992949bf0674f08a47b0ee05cc9e37c56a04d27a9362dbc2f737a1d5339b1a9f7f2bc916d56dac0eed755e1df1c28de95975b3a0f749de0e8dd54fb3701d8cd9770ff29852a093b2ea0416646b5944ccf6a9aa78e3cb91cdb10bf0851615096aab8cbe7d7f4426d8407716e81abc0df1533b52a28eae547376918553833a30951a9cead135a1ccf5fc39b07ee20e6366f2c813f9dede7c4dc1b7f0e88730bde5b763b833751f6931e1ce179c0233f7bfca81ee91bccd928392daf0aef25169640f65cc58f66cbeda3eb799b6689666c15c7da8c99d7a290748cdc98c5a32075b220a6a702dc531090e19f961ffadc43d92ed5c421369d06dccdc63be048274d3d9a2e2f358ab384ac3c17e620ecc30e3f82845ae56e0eae8689912f3064f8a29e43569f33100ad578bfe38a392463568048b0dec42e71b082f907a4690ec8e54f5ab746020fd931da4bad70610c267897691b57ab0058ec86ac163b416bc8aa46d2f8e92bde0741ad954bd0c7ba24b24c57a31ca4fa44516acbb022f943850eddeda5058cd434425480d1ff0faa7e91cd21abeffd852b00f688f0df528d5691c944edb5d5c8bf809b9f4cfaf66d1d9db98a84ab68f0931c8167d07eeb32f4acc2625030d6599ee4742b46c929c3c6c4f1b64279b593f7e077a7751bf2994cb5741406a1ad18f77d3774781abdcf684c450b62921d53092361bc35cac359ac7effa430f16985797d0f618e91e5fbb8c8a2d9c8543540338a9295c503803e579231b66e8b3ccf0117085282995bc53bfc4c351bd674a9ce17ee4d1cc4a01b3081fc3d8df459cdf3f32e7af46a942955a97ddf31369eb17b656f163a0e9ab24a2f0a2c040cbefa08fc68948c720424e71e4b93faa21f599b37b427b39e0978641ba508e910737fba3329bfac903f21221aa53928b57929b41c1fa87b0901e8771601cc4a301907c15aa038ee3795e6d926fc63eb7bf18fe59a915aa79e5c4603c75685725c9faa5e1824f2d65129ac110adf778c791abba1d54e8c817ffdcdcd186dc06356d4d26257a412ae643cd9cfbce1f653a38e95dcd499b683008ec9adc4c3818f9ae413e6273f4236f6ed03d4a8261e8e4bbe43adb2aabf6c7eb6fb91f8beff9e57ba012dd7750b302b8ce6ab6c5a0b420762de5f76a4e4eb473d7c3aee1df2dc1db2c8ba5ef88de43cbe7d5f0aafd101af2af7d3cfc1f4b6d5b2bc779243ac0f67c1523528a186fd5bfb5dc18ab18e87ea7acca98f86f9c4bdd6fcc78662a2322eb3292f13f797b1ecc36dcfe56455e6ad3fe42f3d2c3063169f070671745c7f2ac4525b8e68cc18dd1527600f801d23f63072f44706b6732fa25d9120f8f54d175af9d0922fdd2b6f5980f94f1ef9a11656e4fcc8e3d515d095afbaeff7847c184d4ffef556208b91297b5e9b3a18af61dc00d259df94f200f2936b9900cfab296c4d167873e6b1796eab67674e472cf78b7830688f10c12228e1af970a774e64a55d2821def18895417cbf83ae017854eab2e1a57eeb2722c5d99c208060acf0205a5b97eb1dfea816a5c880fa8085f971bceb1c1b2e57a8966afb5faedfc26b34a475e3314f859cd16a84196c0b0045a7f4dcc8bd67897d9953f0f240201ac3b97ce4b1e109931f8312f913bb7d78a7d881411d61145c5208f4eecb22f24a407a32d85db8219af83ff4b08451a5931edb40b8caa5a2dbb29060576a3c8529e2f1396f5cdc932878548a7bddb3f3976d71f53185b9e27c35e7bd9c9f58070a1595111825888f6554f2b7c960281f3af642016b1d9dd1298c7aa1925f688548c9699d5a7291cecc87e7ccb967fdec4a9db851e8a8d31b840dc07172bdedc1a4cca1e990545b6662ebce3aec8e0e97f06920463376ae607085620f952d4312584d264d0986b82d5064fc95957d16d4043b85fd2ef44d6e1e8c72c4698b01891a6a0d58e32b5e512445ab6a13217d3c2b81afe15620a29dcd3b97636343180b62bb46d5cc52d4ee93156445bf4afe83287da119f38995cc50d09cbd011705989b2b7092df3aab46501acf68fe9d9c24a175384e0299526ff64db5b687f431600d547011685950a2fed70f51ea09f9c36fa4ae9ac8f556a050ff751b10dd7fe6214a97a009281c6bcf3fa2b6a201f43eb549fac54e4456eca5055cf9293dbda84afe499d90d3eab6ae3fb4dab0137d8b7b793b5de4602905fe6ee578ecb25c4a03a59789e31885fe8ade8eb9c191b78fd7fab19db2732a7136f79a8929e3138baf3eb81e3b89963af19a01c0aacf45f274344df9a6e91baa2e43f7672e954cc2fd70889c75a2dbffe78c38da2cb8d32e80a5e23dc1723b20734d275a021e99cca1d0ded70335112b330fb757e61245915f4d6d287a4a3efb1158ee006540abaa7348d7fdb0dea694756775643efb978b920de75baefa6802eee685cbc7ad7c5f8fd519ad3233e8d70bc8b83acff3ff32a6b4494dd926c1da20972aff432a2913872921934caafee9c0d3116e2ecc5bf88df9cbd8be6a3c78bed8349081c4f33f7f307bd2230765f1e5e5f90c7e7ae350c6263e01673676c5683e9f0b45ec98a66e6db2aabac1f3517d52f96056a0a5f4b7759bc80e9dfb0134729b2b581a99c1a46d0bc9c33a0390c528ae63ea51034d81f140243cd95abfc66b3b932012548ebbded1a76c38b7e732150fb1ce2b82975fb6c2714449be5f0da8feaa98197977fa228f72921cd89d0b418713e810b58935c116124db19582b0951f4d842a259dde869b77ae32778e600ded847e7b14b0e6f94606f2fe4cc421e82cdff03f84b2f59f65cb870d4b8d48995199ed44eaa8e03fb770cdd5d1b612a32b1b7ee8fe62eeec8915a0ae1454f084dcea4a41ad52902942141ce1774fba5c9112863464f724fd8cab1269b08c938e40322e1ee895b4b77e7d6b75765c3f9a9b8100afdbf0a53738a75ab8d9759d788f8a153eb0084b1c077ba011624451f26d0a3ed686c73e4e15a4f02b09ca41d6293e2d4d594e0a9e325a0e1a26a9952121d7a1a7f94d4bca8ed0f8268f09ff7b46eca79e9ecf07f73cb608953eb555178efc642a76853df73fa589c947493e9b62c03c4fa95172abc041e5bc8e0f95a5cbb0f7fc9b64c7eee0529be4eb861cb256c91cca1d9ad12c7f4160c9dca6d158741c1aca3e12216e95bca9cdfd345159c25998c46d0557d7dc263ec32dbfda6ff453b786118b78bf16bba5de0004c6cafb122dc4795eb05b150360deaa26acdf84422af5ec219b6826f3f2c376edb72fc1cf0e1dbff7040c593aa67b6c9f73195907e0aa7d786acd64b1b1544d8225f7d56b7400e281a5ee8511cd1c93f90cc778d3b43e5237326cb054259ffb221863619bd69ace13c00a27d40f2ca4c7a27567ab02218dd87e86715662740c0b8e8f2e9f5285f7c0748acbf6076fecf8489e878bd840450c3dbaa1f777fce7bb074f78e49c091e2dfbd8bf4e4284cb7cbcd9c7bbdad6114dbe7d75837be94d54374309b502fa491c5608121c2bf6a4b2f2584577dc7058d978a3d4eb7a17b00fbbe10942489c629ec9e3e0d905672d0adc4f045a72123c6827e6496e43176038006182dc646d10464c8ed1646d3a61b199e517803c536158e44bd2c336d86d0a339a6302bd3fa6d21ae16e19f13f8798d5e30fb20f92cfb49669d8e047f108b438c4b2474cca525eb8223d3286820a5f25501253547363d06e2e0425bfe270837de9b1c2146290e3607480cd369defb57fa976e7cf3b91f3114db5393dc0b93855e3a895c9ebb6418ffd04dccbd8d04ba62a102f4f2e769df7ac3126afe0e48971d7289cca8948902944354208d94038ae7559b7ba23d15d7c107db0794c4f0c52e517f40833251cecf1d8839ea192e275591bab5cfc4895e7e5d90a42bbffa32e3844ed157b4060d0b459dc81b8cd06264add6d6dbe229f95088869a34db16ba63e0f41aa1b63ae14e7272f2bd126f6decc1279d9ffd2d8342ce06d4958c17d63f0ae334a5aed3384648d328d137e3f62a7b77dcdfc52c741b09d17e6ee73d8f1983ca8767c97278b729016a375b1e3232c186ace5d55cb1dcedde2108786d02a20634017ced2132c8332650369081d62022bdb", 0x1000}, {&(0x7f0000001340)="2c4b87687390ac8aa6e5407984058f3295006a875bb5a95f2c51afeb88404764210ff4afb531185bf5427b95852f31af1b8c7dbefe4242d9f050e9abdddb1dc17afcd9995be104fc589b1010305189379167a3e48cdd1e13f281ba911a15950ba3a25d473af7aaad2071a4f86e3154bcbc1fb2dbe0792eb34742b5c41d2d5b877d1a72ab", 0x84}], 0x7, 0x1) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1375.793370][T32046] tomoyo_mount_permission+0x923/0xa30 [ 1375.798931][T32046] ? kmem_cache_free+0xd8/0xf0 [ 1375.803997][T32046] tomoyo_sb_mount+0x35/0x40 [ 1375.808592][T32046] security_sb_mount+0x84/0xe0 [ 1375.813357][T32046] do_mount+0x10a/0x2510 [ 1375.817595][T32046] ? copy_mount_options+0x278/0x3c0 [ 1375.822797][T32046] ? copy_mount_options+0x25e/0x3c0 [ 1375.827998][T32046] ? __sanitizer_cov_trace_pc+0x31/0x50 [ 1375.833541][T32046] ? copy_mount_options+0x308/0x3c0 [ 1375.838744][T32046] ksys_mount+0xcc/0x100 [ 1375.842989][T32046] __x64_sys_mount+0xbf/0xd0 [ 1375.847587][T32046] do_syscall_64+0xf7/0x1c0 [ 1375.852098][T32046] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1375.857991][T32046] RIP: 0033:0x45d08a [ 1375.861886][T32046] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1375.881490][T32046] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 11:06:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = semget$private(0x0, 0x2000000010a, 0x0) semctl$SETALL(r1, 0x0, 0x11, &(0x7f0000000780)) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000080)) semctl$SEM_STAT(r1, 0x1, 0x12, &(0x7f0000000040)=""/53) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1375.889906][T32046] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1375.897969][T32046] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1375.905941][T32046] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1375.913913][T32046] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1375.921890][T32046] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1375.955706][T32046] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1375.963843][T32162] /dev/loop0: Can't open blockdev [ 1375.984968][T32219] /dev/loop0: Can't open blockdev 11:06:03 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x329, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:03 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5000000]}) 11:06:03 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000040)="d39e0dbaa059b21744608af5f28817d543c9ffd84bcf4dbd5e97f103f7375293a51c444c2635383b78814655cfeaf992021e4a91a27ee1b2c657da01acc0406c0122ef7da7cff8d0ba7c0212f8e06ce27d48df1ddd224c965669d52a505b", 0x5e}, {&(0x7f0000000140)="9ba1a73a1313c8f6534b81d3489ca7f2b46951d88ac15db7251f6a528fa676ebb1c250b4b4ab18a0224aaf56ea9d48ea682ef505d0173d7b1c525d62021d3cd75613040c0945ab5b9bb75593de10bcb8030db9518bc7639139ec19967e06e404041a3135d1c018444884fed958bd3cce2f24338b2df030809f8f37379dcb1e60f9a635050da554fa8c7e5720e27ca9b7d9cf3a5c7da3dfef9b116476ebfa81adab1cec31d47cbdb0d6e46f44d2e56d26154fabd2874826f036f8c79d6905aefccf3b8feeee44fea181c4096ec595a85ec3eb222f37bcbe", 0xd7}, {&(0x7f0000000240)="a995e6b8cba62ea27df6a6e8eacf295906dd65c1c4984da957f0377c83779fbd7b96fe709e787db3677992cbacc3a719c0b290a26aede68f505d6b2b6ebe38cfe10703794cc37e3127501acd9b4e070fca482dac68f0e88b5bac96b9a7713c335adfa773d4da520c1382e2ee2b30fdd6e478779828e07ab35b3e04b4f2cccc40afc4c533cd79d8b6e89acab97aabd3efb136c3d98e621f76c6020d3935ed9ae7b3", 0xa1}, {&(0x7f0000000300)="a95946847bff799cb99dc50d89214f5835408c8211d91d86cbb23474006c950598d1971f1846c06aaf93c54579f01a8f2de784046cf57c129ef7d042ce6e5e018088d036d94d519c4277182deb77571beb6d0ba51d631cf3f2b0e628ce8645a4394bb8b21f6d4da9f5dfc2e542492960df83062de9e635175c2687ef5ef0f9c49563a5074ab1a24fc1e30194af04add3b3677756fe36c7502943b5ab11f8052448873133b68695a7a4ef048d9ecb00967c6a0d0fd4a531cc93f22909bb8a8899ad8ae065322ba4677324734f2b3b4b8af11db96fe935cf7844950527263f7e4470c48221ee", 0xe5}, {&(0x7f0000000400)="aa46174e13f7606c2582e2298e735b27709fcb3e4140dd39c53f246f2b7bae26da5837493d9d1698cf11873c894b17b718d5f0226f8c3e8c308b54908f1b1ec9e166698a08de7d51be9cde5170a30e24fbe980dfdbf7f6ff933202b53a3eb59457e77ccf1b272b9ad0afad04c2073e821ce10650648842767ce41340aa2b0870ee7e2f3e49b002ef5b121bf30e9c102c9991f0275c2e44aa0d8a9ff25fbe62f2c7330bf63331d666eaaab250dad2fac93ff7dbc832190a5cd083a30645ed7bc5f1ab08be19d68dae830b7253", 0xcc}], 0x5) r1 = socket$isdn_base(0x22, 0x3, 0x0) write$binfmt_aout(r0, &(0x7f0000000b80)={{0x108, 0x8, 0x1, 0x63, 0x3a0, 0xe8ab, 0x17c, 0x7f}, "bca96b436577a210d391c2b3debf82c55955776482bac53d7ed2b76359afcb6b089a72490ca6ad10e45a4630cfbfffcb8e0e53c1f407e6c8d9930e1d64923ad3562bf20a92b8ab3199bf7c23d8f2bccec5c361d1f8936bd5e80c78916e380a6d35c26108f520b51a48d28f722641832f0ce86862b81825877e99f6bcb745567be851b18224e83eaec51cc512b138e52dfd4280bcc352b7547462269ca2035e27c0a416418e54845109be", [[], [], [], [], [], []]}, 0x6ca) sendmsg(r1, &(0x7f00000000c0)={&(0x7f0000000580)=@isdn={0x22, 0x44, 0x3, 0x3d, 0x9}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000600)="026fd020e97c017b3cecafc6d9b7e2e9315653d37e599ac08ae315f8551771ad30a4b40a79a841f67578ae96866fec452aadcb801bc2345698178b9229e511eb73211e9abe6c3a43e715acd59ae725676daa3fb0cf93cf1095aea6184fcd124bcb9752c7eb3b5d89cfced831169fd18562b2a8c8b84777ea81f1cf30476c0cd5f3173428033ba4f720e2ef9072b4e178b708672419c8b1d32222f22fabdeb69bc0f332333acf06c0c05fd6691777bd7292928f0be8dbd101ea9875da64913356efbbe18b9e2b6e3c405824c73f8a35f5c9db29c16961e06d76d8d4d6455f7bc7f93bbd91c0b097393276", 0xea}, {&(0x7f0000000700)="4ce5624f43d8f6713b91ea4323acaa20e0e6e1b0d7027eeaf9b8680adfa791f493fd5f5279c5cf57b0cc2bbff197c0bedfdb2b70638a0a5913013eaf8f70b3c356aded183eb388b0ab75d5e89e816a210f089ad00b13fdabc029a77a0c66b6cd756f03082c9108d08ee57fd8ed3cd315192b952befcb2d1e21607a57acfcba10b03a38cdadc0e03b4662cd299b0d1a71f4d996c48721d443676e5243b93b0dce5e05dce77b53be741bf3bccd10055e1db14011040c99f73f3891933a8cadfa0e283075379f45a3d748f302a9403eb2610e7750a49447c94a9d7029e866679001902c03069cc0a393dcae8b1d47a9894f8200b1d9dd1cd3ed", 0xf8}, {&(0x7f0000000800)="eca5171d87474ed7d9142fcc2dd1dd31ca239e8a023cf7f3edee3637b5d42e591d4e19e0dcf647d18b6228dc50e4c2f860e6a8daaafeefcde3f6800abcd276bed6c7b0b0964c8d5e36e2b6edf89d67b586413d94394622ea9824c9b9023ec7119134ce688c6d5c3a950444696753e807ba5bfb4ce079607172d94d7b84d10a216b87b3158bf7025cec7fc34a87b8e1ea5e6ca452d2825d6adc81b83a897d3dd846d73193895e3a03438f073d9777bd076ace4b65f2df4978fd0516122aae5edbd17ae5a0454218aebb43bc688b0f", 0xce}, {&(0x7f0000000900)="e1a5fcc82073fb0c8a6730de34d1c2d1827154523293d9034c5c0011c188f21bb797affd0e651f1b3bc5c4df37d4ce6d0dd81b3e30fab8ba4102369c9f46f5f1de", 0x41}, {&(0x7f0000000980)="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", 0xfb}], 0x5, &(0x7f0000000b00)=[{0x48, 0x0, 0x100, "81819fd9e3eb2bb41aaf10b020b28e373bddce54eec57811521ecd4744bb83b0be7f59232a0e9e1354d34c1082a3b64a3e4a"}], 0x48}, 0x801) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000140)) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:03 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x400c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1376.148671][T32274] /dev/loop0: Can't open blockdev 11:06:03 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/#\x00\x00f\x00', 0x2, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000040)={0x3, 0x0, "5a4eaad23ba4edc4c5dc319f73eec200", {0x10}}) 11:06:03 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x6000000]}) [ 1376.180505][T32299] /dev/loop0: Can't open blockdev 11:06:03 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x400d}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:04 executing program 1: acct(&(0x7f0000000040)='./file0\x00') syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000080)={0x9, 0x0, "5a4eaad23bbac6608de17a3a0b5201eec4c5dc319ff308c2", {0x1}}) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x400000, 0x2) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0xac, 0x0, 0x81, 0xfff9, 0x4c3}, 0xc) [ 1376.273269][T32309] FAULT_INJECTION: forcing a failure. [ 1376.273269][T32309] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.312901][T32309] CPU: 0 PID: 32309 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1376.321618][T32309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1376.331683][T32309] Call Trace: [ 1376.334983][T32309] dump_stack+0x1fb/0x318 [ 1376.339327][T32309] should_fail+0x555/0x770 [ 1376.343791][T32309] __should_failslab+0x11a/0x160 [ 1376.348737][T32309] should_failslab+0x9/0x20 [ 1376.353241][T32309] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1376.358537][T32309] ? legacy_init_fs_context+0x51/0xc0 [ 1376.363924][T32309] legacy_init_fs_context+0x51/0xc0 [ 1376.369128][T32309] alloc_fs_context+0x53a/0x640 [ 1376.374003][T32309] fs_context_for_mount+0x24/0x30 [ 1376.379035][T32309] do_mount+0x10a7/0x2510 [ 1376.383372][T32309] ? copy_mount_options+0x308/0x3c0 [ 1376.388576][T32309] ksys_mount+0xcc/0x100 [ 1376.392836][T32309] __x64_sys_mount+0xbf/0xd0 [ 1376.397437][T32309] do_syscall_64+0xf7/0x1c0 [ 1376.401944][T32309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.407834][T32309] RIP: 0033:0x45d08a 11:06:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x32a, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1376.411726][T32309] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1376.431324][T32309] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1376.431334][T32309] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1376.431339][T32309] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1376.431344][T32309] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1376.431349][T32309] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 11:06:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x7000000]}) 11:06:04 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23b00000000e17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1376.431353][T32309] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1376.453473][T32400] /dev/loop0: Can't open blockdev [ 1376.466658][T32401] /dev/loop0: Can't open blockdev 11:06:04 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:04 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x400e}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:04 executing program 4: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) 11:06:04 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x80040, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000040)=0x3, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0xc0a43, 0x0) ioctl$VIDIOC_ENUMSTD(r2, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5e4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x9}}) 11:06:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x8000000]}) 11:06:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x32b, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1376.729581][T32508] /dev/loop0: Can't open blockdev 11:06:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x9000000]}) 11:06:04 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0xfffffffffffffffe, 0x0, 0x9, 0x0, 0x914}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x2, 0x0, "5a4eaad23bbac6608de17a3a0b0800edc4c5dc319ff3eec2"}) [ 1376.761380][T32512] /dev/loop0: Can't open blockdev 11:06:04 executing program 4: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) memfd_create(&(0x7f0000000040)='posix_acl_accessposix_acl_accessuser\x00', 0x3) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0x1000, "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"}, &(0x7f00000000c0)=0x1008) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000001200)={r2, @in={{0x2, 0x4e21, @empty}}, [0xe15, 0x9, 0xfff, 0x2, 0xb405, 0x8, 0x2, 0x6, 0x42d1, 0x101, 0x5, 0x7bb7, 0x8, 0x3]}, &(0x7f0000000140)=0x100) 11:06:04 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4010}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xa000000]}) [ 1376.883504][T32514] FAULT_INJECTION: forcing a failure. [ 1376.883504][T32514] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.915209][T32514] CPU: 0 PID: 32514 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1376.923927][T32514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1376.933992][T32514] Call Trace: [ 1376.937292][T32514] dump_stack+0x1fb/0x318 [ 1376.941634][T32514] should_fail+0x555/0x770 [ 1376.946069][T32514] __should_failslab+0x11a/0x160 [ 1376.951008][T32514] ? tomoyo_encode2+0x273/0x5a0 [ 1376.955866][T32514] should_failslab+0x9/0x20 [ 1376.960404][T32514] __kmalloc+0x7a/0x340 [ 1376.964580][T32514] tomoyo_encode2+0x273/0x5a0 [ 1376.969265][T32514] tomoyo_encode+0x29/0x40 [ 1376.973684][T32514] tomoyo_mount_permission+0x216/0xa30 [ 1376.979354][T32514] ? filename_lookup+0x4b0/0x690 11:06:04 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x34f, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1376.984291][T32514] ? kmem_cache_free+0xd8/0xf0 [ 1376.984323][T32514] tomoyo_sb_mount+0x35/0x40 [ 1376.984335][T32514] security_sb_mount+0x84/0xe0 [ 1376.984349][T32514] do_mount+0x10a/0x2510 [ 1376.984358][T32514] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1376.984370][T32514] ? copy_mount_options+0x5f/0x3c0 [ 1376.989332][T32625] /dev/loop0: Can't open blockdev [ 1376.993694][T32514] ? copy_mount_options+0x308/0x3c0 [ 1376.993708][T32514] ksys_mount+0xcc/0x100 [ 1376.993719][T32514] __x64_sys_mount+0xbf/0xd0 [ 1376.993733][T32514] do_syscall_64+0xf7/0x1c0 [ 1376.993746][T32514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1376.993755][T32514] RIP: 0033:0x45d08a [ 1376.993764][T32514] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1376.993769][T32514] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1376.993778][T32514] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1376.993783][T32514] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1376.993794][T32514] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1377.002773][T32514] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1377.002779][T32514] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1377.092675][T32630] /dev/loop0: Can't open blockdev 11:06:04 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:04 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = timerfd_create(0x0, 0x400) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) ioctl$VIDIOC_TRY_EXT_CTRLS(r2, 0xc0205649, &(0x7f00000004c0)={0x0, 0x5, 0x6, [], &(0x7f0000000480)={0x55, 0x6325, [], @p_u32=&(0x7f0000000440)=0x9}}) timerfd_settime(r2, 0x0, &(0x7f00000003c0)={{r3, r4+10000000}}, &(0x7f0000000400)) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000140)="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", 0xfc}, {&(0x7f0000000040)="79b0461e0cecaca8ededa28fc4664d86bec8ac83eb6c0aab168bd0dbb5991054e750edcf8d9445c46899840f6746ca", 0x2f}, {&(0x7f0000000240)="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", 0xfb}, {&(0x7f0000000080)="099c5d12981f3d8a4c2cd2b0d02c545a5aae3d2c3fcde6da4ef4b2cd3e359f14a07275a9246797f10d360d4f7bd2af026328f6cf0117a99c9af82f4ae79a1909a4e1480a5d66e66a5600d55690609fbaba387da802ade1bd3ae5932aa484a6576c50e090e5f06b26", 0x68}], 0x4) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3d, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:04 executing program 4: ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:04 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xb000000]}) 11:06:04 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4011}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1377.198984][T32626] XFS (loop3): Invalid superblock magic number 11:06:04 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xc000000]}) [ 1377.289390][T32642] /dev/loop0: Can't open blockdev [ 1377.321254][T32745] /dev/loop0: Can't open blockdev [ 1377.325061][T32725] FAULT_INJECTION: forcing a failure. [ 1377.325061][T32725] name failslab, interval 1, probability 0, space 0, times 0 11:06:05 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x1}}) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) process_vm_writev(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/43, 0x2b}], 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)=""/199, 0xc7}, {&(0x7f00000000c0)}, {&(0x7f0000000240)=""/98, 0x62}], 0x3, 0x0) 11:06:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4012}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1377.440925][T32725] CPU: 1 PID: 32725 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1377.449669][T32725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1377.459733][T32725] Call Trace: [ 1377.463044][T32725] dump_stack+0x1fb/0x318 [ 1377.467392][T32725] should_fail+0x555/0x770 [ 1377.471831][T32725] __should_failslab+0x11a/0x160 [ 1377.476781][T32725] ? tomoyo_encode2+0x273/0x5a0 [ 1377.481640][T32725] should_failslab+0x9/0x20 [ 1377.486153][T32725] __kmalloc+0x7a/0x340 11:06:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4025}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1377.486900][T32755] /dev/loop0: Can't open blockdev [ 1377.490313][T32725] tomoyo_encode2+0x273/0x5a0 [ 1377.490331][T32725] tomoyo_realpath_from_path+0x769/0x7c0 [ 1377.490352][T32725] tomoyo_mount_permission+0x294/0xa30 [ 1377.490368][T32725] ? filename_lookup+0x4b0/0x690 [ 1377.490388][T32725] ? kmem_cache_free+0xd8/0xf0 [ 1377.499171][T32756] /dev/loop0: Can't open blockdev [ 1377.500096][T32725] tomoyo_sb_mount+0x35/0x40 [ 1377.500112][T32725] security_sb_mount+0x84/0xe0 [ 1377.500127][T32725] do_mount+0x10a/0x2510 [ 1377.500142][T32725] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1377.545243][T32725] ? copy_mount_options+0x5f/0x3c0 [ 1377.550369][T32725] ? copy_mount_options+0x308/0x3c0 [ 1377.555575][T32725] ksys_mount+0xcc/0x100 [ 1377.556489][T32758] /dev/loop0: Can't open blockdev [ 1377.559818][T32725] __x64_sys_mount+0xbf/0xd0 [ 1377.559837][T32725] do_syscall_64+0xf7/0x1c0 [ 1377.559854][T32725] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1377.559869][T32725] RIP: 0033:0x45d08a [ 1377.559883][T32725] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1377.568561][T32759] /dev/loop0: Can't open blockdev [ 1377.569465][T32725] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1377.569477][T32725] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1377.569484][T32725] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1377.569490][T32725] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 11:06:05 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x8000, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) [ 1377.569495][T32725] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1377.569500][T32725] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1377.811794][T32725] ERROR: Out of memory at tomoyo_realpath_from_path. 11:06:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xd000000]}) 11:06:05 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:05 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x7ff, 0x6, 0x4, 0x80000000, {}, {0x5, 0x1d, 0x5, 0x4, 0xec, 0x5, "5b7ebc17"}, 0x5, 0x4, @planes=&(0x7f0000000040)={0x7fffffff, 0x80000001, @mem_offset=0x3, 0xff}, 0x4}) 11:06:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4048}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:05 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) open(&(0x7f0000000040)='./file0\x00', 0x47cbefe717c772c9, 0x81) 11:06:05 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x35e, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe000000]}) [ 1377.993447][ T401] /dev/loop0: Can't open blockdev [ 1378.019397][ T426] /dev/loop0: Can't open blockdev 11:06:05 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x10, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0x2}}) 11:06:05 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x404c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:05 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x8000, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000080)={0x1000, 0x1, 0x8, 0x5, 0x1f}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x10000000]}) [ 1378.111386][ T512] FAULT_INJECTION: forcing a failure. [ 1378.111386][ T512] name failslab, interval 1, probability 0, space 0, times 0 [ 1378.171798][ T512] CPU: 1 PID: 512 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1378.180361][ T512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1378.190431][ T512] Call Trace: [ 1378.193748][ T512] dump_stack+0x1fb/0x318 [ 1378.198099][ T512] should_fail+0x555/0x770 [ 1378.202530][ T512] __should_failslab+0x11a/0x160 [ 1378.207554][ T512] ? btrfs_mount+0x83/0x18e0 [ 1378.212163][ T512] should_failslab+0x9/0x20 11:06:05 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x11000000]}) [ 1378.217631][ T512] __kmalloc_track_caller+0x79/0x340 [ 1378.223021][ T512] ? __fs_reclaim_release+0x4/0x20 [ 1378.228138][ T512] kstrdup+0x34/0x70 [ 1378.232045][ T512] btrfs_mount+0x83/0x18e0 [ 1378.236559][ T512] ? check_preemption_disabled+0x47/0x2a0 [ 1378.242287][ T512] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1378.247659][ T512] ? cap_capable+0x250/0x290 [ 1378.252333][ T512] ? safesetid_security_capable+0x89/0xf0 [ 1378.258068][ T512] legacy_get_tree+0xf9/0x1a0 [ 1378.262758][ T512] ? btrfs_resize_thread_pool+0x290/0x290 11:06:06 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x56ad87da, 0x4100) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000140)={0x9, 0x1, 0x96}, 0x6) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0x31d, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5a8000}, {0xa, 0x4e24, 0x6, @ipv4={[], [], @empty}, 0x6}, 0xffffffffffffffff, 0xca}}, 0x48) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f00000001c0)) [ 1378.268484][ T512] vfs_get_tree+0x8b/0x2a0 [ 1378.273018][ T512] do_mount+0x16c0/0x2510 [ 1378.277369][ T512] ? copy_mount_options+0x308/0x3c0 [ 1378.282586][ T512] ksys_mount+0xcc/0x100 [ 1378.286945][ T512] __x64_sys_mount+0xbf/0xd0 [ 1378.291549][ T512] do_syscall_64+0xf7/0x1c0 [ 1378.296062][ T512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1378.301954][ T512] RIP: 0033:0x45d08a [ 1378.305849][ T512] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1378.325471][ T512] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1378.334000][ T512] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1378.341982][ T512] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1378.349966][ T512] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1378.357943][ T512] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1378.365938][ T512] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1378.378909][ T500] XFS (loop3): Invalid superblock magic number [ 1378.381201][ T590] /dev/loop0: Can't open blockdev 11:06:06 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x12000000]}) 11:06:06 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xa0, 0x20) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000140)={0xef, 0x0, 0xfffffe01, 'queue0\x00', 0x4}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) fallocate(r2, 0x12, 0x2, 0x8810) 11:06:06 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x405c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1378.542824][ T738] FAULT_INJECTION: forcing a failure. [ 1378.542824][ T738] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1378.555009][ T702] /dev/loop0: Can't open blockdev [ 1378.556070][ T738] CPU: 1 PID: 738 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1378.556078][ T738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1378.556082][ T738] Call Trace: [ 1378.556106][ T738] dump_stack+0x1fb/0x318 [ 1378.587359][ T738] should_fail+0x555/0x770 [ 1378.591895][ T738] should_fail_alloc_page+0x55/0x60 [ 1378.597235][ T738] prepare_alloc_pages+0x283/0x460 [ 1378.602344][ T738] __alloc_pages_nodemask+0xb2/0x5d0 [ 1378.607639][ T738] kmem_getpages+0x4d/0xa00 [ 1378.612412][ T738] cache_grow_begin+0x7e/0x2c0 [ 1378.617172][ T738] cache_alloc_refill+0x311/0x3f0 [ 1378.622200][ T738] ? check_preemption_disabled+0xb7/0x2a0 [ 1378.627922][ T738] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1378.633294][ T738] ? btrfs_mount_root+0x12c/0x1040 [ 1378.638492][ T738] btrfs_mount_root+0x12c/0x1040 [ 1378.643431][ T738] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1378.648712][ T738] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1378.654422][ T738] ? trace_kfree+0xb2/0x110 [ 1378.658924][ T738] legacy_get_tree+0xf9/0x1a0 [ 1378.663595][ T738] ? btrfs_control_open+0x40/0x40 [ 1378.668616][ T738] vfs_get_tree+0x8b/0x2a0 [ 1378.673026][ T738] vfs_kern_mount+0xc2/0x160 [ 1378.677648][ T738] btrfs_mount+0x34f/0x18e0 [ 1378.682153][ T738] ? check_preemption_disabled+0x47/0x2a0 [ 1378.687870][ T738] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1378.693147][ T738] ? cap_capable+0x250/0x290 [ 1378.697731][ T738] ? safesetid_security_capable+0x89/0xf0 [ 1378.705706][ T738] legacy_get_tree+0xf9/0x1a0 [ 1378.710395][ T738] ? btrfs_resize_thread_pool+0x290/0x290 [ 1378.716123][ T738] vfs_get_tree+0x8b/0x2a0 [ 1378.720537][ T738] do_mount+0x16c0/0x2510 [ 1378.724866][ T738] ? copy_mount_options+0x308/0x3c0 [ 1378.730058][ T738] ksys_mount+0xcc/0x100 [ 1378.734409][ T738] __x64_sys_mount+0xbf/0xd0 [ 1378.739002][ T738] do_syscall_64+0xf7/0x1c0 [ 1378.743504][ T738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1378.749387][ T738] RIP: 0033:0x45d08a [ 1378.753293][ T738] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1378.772901][ T738] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1378.781310][ T738] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1378.789280][ T738] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1378.797244][ T738] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1378.805210][ T738] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1378.813198][ T738] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:06 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3e8, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:06 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23b80000001000800"}) 11:06:06 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @broadcast, @local}, &(0x7f0000000080)=0xc) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x800, 0x0) 11:06:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x14000000]}) 11:06:06 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4060}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:06 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1379.114182][ T751] /dev/loop0: Can't open blockdev 11:06:06 executing program 4: openat$udambuf(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/udmabuf\x00', 0x2) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="58000000000000001401000008000000000000000000000099999999999999990000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d49be6e2d91a4f09afdc3a415c42f414c3366a39ca8533b55979c393afc18e2cc3c2b3155bdf602659095ed7168dca3d33dc4ad4fa4920e1e8a3f32541837551c7cfeb81027b3b9662144a94c51a3624a736f13ed26f2fffcf430cae49d992b256932dd2fb5eb11a0c96023ec36c2d8783324f62b67cbd7a35d1f1d0e655c1e203b5260bd743e08800"/234], 0x58}, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000140)='/dev/vbi#\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r3, 0x0, 0x7, &(0x7f00000000c0)='cpuset\x00', r5}, 0x30) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000080)={{0x3, 0x0, 0xfba, 0x0, 0x200}}) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000240)={{0x0, 0x0, @descriptor="ec1b35ff8afba731"}}) 11:06:06 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/v/vbi#\x00\xff\xff', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040)=0x4110, 0x4) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:06 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x1e000000]}) [ 1379.140593][ T752] FAULT_INJECTION: forcing a failure. [ 1379.140593][ T752] name failslab, interval 1, probability 0, space 0, times 0 [ 1379.157800][ T759] /dev/loop0: Can't open blockdev [ 1379.204566][ T752] CPU: 1 PID: 752 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1379.213136][ T752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.224073][ T752] Call Trace: [ 1379.227386][ T752] dump_stack+0x1fb/0x318 [ 1379.232172][ T752] should_fail+0x555/0x770 [ 1379.236606][ T752] __should_failslab+0x11a/0x160 [ 1379.241550][ T752] ? tomoyo_encode2+0x273/0x5a0 [ 1379.246405][ T752] should_failslab+0x9/0x20 [ 1379.250910][ T752] __kmalloc+0x7a/0x340 [ 1379.255227][ T752] tomoyo_encode2+0x273/0x5a0 [ 1379.259929][ T752] tomoyo_realpath_from_path+0x769/0x7c0 [ 1379.265674][ T752] tomoyo_mount_permission+0x923/0xa30 [ 1379.271151][ T752] ? kmem_cache_free+0xd8/0xf0 [ 1379.275941][ T752] tomoyo_sb_mount+0x35/0x40 [ 1379.280533][ T752] security_sb_mount+0x84/0xe0 [ 1379.285300][ T752] do_mount+0x10a/0x2510 [ 1379.289545][ T752] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1379.295089][ T752] ? copy_mount_options+0x5f/0x3c0 [ 1379.300223][ T752] ? copy_mount_options+0x308/0x3c0 [ 1379.305429][ T752] ksys_mount+0xcc/0x100 [ 1379.309674][ T752] __x64_sys_mount+0xbf/0xd0 [ 1379.314363][ T752] do_syscall_64+0xf7/0x1c0 [ 1379.318872][ T752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.325725][ T752] RIP: 0033:0x45d08a [ 1379.329623][ T752] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1379.349328][ T752] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1379.357860][ T752] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1379.365849][ T752] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1379.373825][ T752] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1379.381796][ T752] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1379.389764][ T752] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:07 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4068}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:07 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x7, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x0, 0xfffd}, 0xfffffffe}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0x1, 0x7, 0x275, 0x9}, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x4842, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001600)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000001700)=0xe8) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r4, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r4, 0x800000c0045009, &(0x7f0000000180)) ioctl$PPPIOCGNPMODE(r4, 0xc008744c, &(0x7f00000001c0)={0x57, 0x1}) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000001800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80020000}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00082b000000080003003a00000014000976a4f3961b2edd91d95dd00e8000000000000008000000000000001400070000000000000000000000ffff000000000079efb3c2d4a9a16b969e1c7b00000000000100db56", @ANYRES32=r3], 0x60}, 0x1, 0x0, 0x0, 0x100048d0}, 0x20000080) [ 1379.406261][ T752] ERROR: Out of memory at tomoyo_realpath_from_path. 11:06:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x25000000]}) 11:06:07 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1379.504461][ T818] /dev/loop0: Can't open blockdev [ 1379.528346][ T875] /dev/loop0: Can't open blockdev 11:06:07 executing program 5 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:07 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) creat(&(0x7f0000000040)='./file0\x00', 0x100) 11:06:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x3f000000]}) 11:06:07 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x406c}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1379.647101][ T883] FAULT_INJECTION: forcing a failure. [ 1379.647101][ T883] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1379.660430][ T883] CPU: 0 PID: 883 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1379.668931][ T883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1379.679010][ T883] Call Trace: [ 1379.682312][ T883] dump_stack+0x1fb/0x318 [ 1379.686654][ T883] should_fail+0x555/0x770 [ 1379.691079][ T883] should_fail_alloc_page+0x55/0x60 11:06:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x40000000]}) [ 1379.696283][ T883] prepare_alloc_pages+0x283/0x460 [ 1379.701406][ T883] __alloc_pages_nodemask+0xb2/0x5d0 [ 1379.706711][ T883] kmem_getpages+0x4d/0xa00 [ 1379.711226][ T883] cache_grow_begin+0x7e/0x2c0 [ 1379.715998][ T883] cache_alloc_refill+0x311/0x3f0 [ 1379.721028][ T883] ? check_preemption_disabled+0xb7/0x2a0 [ 1379.726749][ T883] __kmalloc+0x318/0x340 [ 1379.726762][ T883] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 1379.726776][ T883] tomoyo_realpath_from_path+0xdc/0x7c0 11:06:07 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x40, 0x607001) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000180)={0x0, 0x6, 0x4}) creat(&(0x7f0000000140)='./file0\x00', 0x47) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1379.726796][ T883] tomoyo_mount_permission+0x923/0xa30 [ 1379.726820][ T883] ? kmem_cache_free+0xd8/0xf0 [ 1379.726847][ T883] tomoyo_sb_mount+0x35/0x40 [ 1379.736778][ T883] security_sb_mount+0x84/0xe0 [ 1379.736793][ T883] do_mount+0x10a/0x2510 [ 1379.736802][ T883] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1379.736809][ T883] ? copy_mount_options+0x5f/0x3c0 [ 1379.736820][ T883] ? copy_mount_options+0x308/0x3c0 [ 1379.736832][ T883] ksys_mount+0xcc/0x100 [ 1379.736844][ T883] __x64_sys_mount+0xbf/0xd0 [ 1379.736860][ T883] do_syscall_64+0xf7/0x1c0 [ 1379.736876][ T883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1379.736885][ T883] RIP: 0033:0x45d08a [ 1379.736895][ T883] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1379.736901][ T883] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1379.736910][ T883] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a 11:06:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x5c000000]}) 11:06:07 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x200400, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000140)={0x3f, 0xc, [0x1ff, 0xc2d, 0x4a64]}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) socket$caif_stream(0x25, 0x1, 0x2) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x101) [ 1379.736915][ T883] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1379.736920][ T883] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1379.736925][ T883] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1379.736930][ T883] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1379.793928][ T948] /dev/loop0: Can't open blockdev 11:06:07 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x0, 0x0, "3d4eaad23bbac6708de1ff000b52e5edc4c5dc719ff3eec2"}) 11:06:07 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xe7ffffff]}) [ 1379.908652][ T878] XFS (loop3): Invalid superblock magic number 11:06:07 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4074}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1379.978310][ T1046] /dev/loop0: Can't open blockdev [ 1380.117721][ T1116] /dev/loop0: Can't open blockdev [ 1380.134268][ T1117] /dev/loop0: Can't open blockdev 11:06:08 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:08 executing program 5 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:08 executing program 1: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x48000, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x400000, "5a4eaad23bbac6608de17a3a0b52e5b83f000000000000c2", {}, 0x400000}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000080)={0x0, 0x0, 0x97a9f9e3bb277ce8, 0x7, 0x1, {0x7, 0x2}, 0x1}) 11:06:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xfdfdffff]}) 11:06:08 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r4, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r4, 0x800000c0045009, &(0x7f0000000180)) r5 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r5, 0x800000c0045009, &(0x7f0000000040)=0x1) r6 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r6, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r6, 0x800000c0045009, &(0x7f0000000180)) ioctl$EVIOCGRAB(r6, 0x40044590, &(0x7f00000000c0)=0x3) ioctl$int_in(r5, 0x800000c0045009, &(0x7f0000000180)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cpuacct.usage_user\x00', 0x0, 0x0) r7 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r7, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r7, 0x800000c0045009, &(0x7f0000000180)) r8 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r8, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r8, 0x800000c0045009, &(0x7f0000000180)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r8, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000140)={r9, 0x80000000}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:08 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x407a}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:08 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xfffffdfd]}) [ 1380.529325][ T1129] FAULT_INJECTION: forcing a failure. [ 1380.529325][ T1129] name failslab, interval 1, probability 0, space 0, times 0 [ 1380.542735][ T1132] /dev/loop0: Can't open blockdev [ 1380.579627][ T1175] /dev/loop0: Can't open blockdev [ 1380.597229][ T1129] CPU: 1 PID: 1129 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1380.605856][ T1129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1380.615921][ T1129] Call Trace: [ 1380.619224][ T1129] dump_stack+0x1fb/0x318 [ 1380.623565][ T1129] should_fail+0x555/0x770 11:06:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0x8000000, 0x80}}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) [ 1380.627998][ T1129] __should_failslab+0x11a/0x160 [ 1380.632943][ T1129] ? vfs_parse_fs_string+0xed/0x1a0 [ 1380.638149][ T1129] should_failslab+0x9/0x20 [ 1380.642776][ T1129] __kmalloc_track_caller+0x79/0x340 [ 1380.648073][ T1129] kmemdup_nul+0x2a/0xa0 [ 1380.652933][ T1129] vfs_parse_fs_string+0xed/0x1a0 [ 1380.657978][ T1129] vfs_kern_mount+0x77/0x160 [ 1380.662578][ T1129] btrfs_mount+0x34f/0x18e0 [ 1380.667122][ T1129] ? check_preemption_disabled+0x47/0x2a0 [ 1380.672850][ T1129] ? vfs_parse_fs_string+0x13b/0x1a0 11:06:08 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000080)={0x2, 0x81, 0x1, 0x5, 0x3}) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) r4 = openat$cgroup_ro(r3, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r4, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e20, 0x6, @remote, 0x7f}, {0xa, 0x4e23, 0xffffffff, @dev={0xfe, 0x80, [], 0x17}, 0x371902b3}, 0x5, [0x10000, 0x7fff, 0xeaf, 0x7, 0x4a8, 0x9, 0x81, 0xfffffff7]}, 0x5c) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1380.678144][ T1129] ? cap_capable+0x250/0x290 [ 1380.682757][ T1129] ? safesetid_security_capable+0x89/0xf0 [ 1380.688516][ T1129] legacy_get_tree+0xf9/0x1a0 [ 1380.693202][ T1129] ? btrfs_resize_thread_pool+0x290/0x290 [ 1380.698944][ T1129] vfs_get_tree+0x8b/0x2a0 [ 1380.703379][ T1129] do_mount+0x16c0/0x2510 [ 1380.707729][ T1129] ? copy_mount_options+0x308/0x3c0 [ 1380.712969][ T1129] ksys_mount+0xcc/0x100 [ 1380.717227][ T1129] __x64_sys_mount+0xbf/0xd0 [ 1380.721855][ T1129] do_syscall_64+0xf7/0x1c0 11:06:08 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1380.726373][ T1129] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1380.732272][ T1129] RIP: 0033:0x45d08a [ 1380.736174][ T1129] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1380.755785][ T1129] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1380.764234][ T1129] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1380.772221][ T1129] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 11:06:08 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x101, 0xd8842) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000001c0)={0x100, @time={r1, r2+30000000}, 0x6, {0x20, 0x5}, 0x81, 0x2, 0x93}) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r4, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r4, 0x800000c0045009, &(0x7f0000000180)) pipe(&(0x7f0000000240)) r5 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r5, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r5, 0x800000c0045009, &(0x7f0000000180)) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x8040ae9f, &(0x7f00000002c0)) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r3, 0x800000c0045009, &(0x7f0000000180)) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000000)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1380.780205][ T1129] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1380.788180][ T1129] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1380.796173][ T1129] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:08 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x5e00}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 1380.875088][ T1429] fuse: Invalid rootmode [ 1380.882263][ T1350] XFS (loop3): Invalid superblock magic number [ 1380.887274][ T1447] fuse: Invalid rootmode 11:06:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xffffffe7]}) 11:06:09 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 11:06:09 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x12202) eventfd2(0x100, 0x1) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0x10000, 0x0, 0x599a, 0x101, 0xd, 0x40, 0x1, 0x7, 0x8f, 0x200, 0x3, 0x3}) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, '\x00', {0x8000}}) 11:06:09 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x7f, 0x6, 0x7fff}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) r2 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r2, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000080)='+', 0x1}]}, 0xc100) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) writev(r2, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0xffe4}], 0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)=0x10001) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) r7 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r7, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r7, 0x800000c0045009, &(0x7f0000000180)) r8 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) r9 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r9, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r9, 0x800000c0045009, &(0x7f0000000180)=0x8) epoll_pwait(r9, &(0x7f00000001c0)=[{}, {}, {}, {}], 0x4, 0x3, &(0x7f0000000200)={0x4}, 0x8) ioctl$int_in(r8, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r8, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r8, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000380)={r10, 0x8000}, &(0x7f00000003c0)=0x8) sendmsg$rds(r6, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], 0x1c5}, 0x48000) signalfd(r6, &(0x7f0000000140)={0x4}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e24, 0x9893, @local, 0x7}, @in6={0xa, 0x4e24, 0x8, @mcast2, 0xe64b}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x10000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in6={0xa, 0x4e20, 0x5, @dev={0xfe, 0x80, [], 0x12}, 0x8}], 0x90) 11:06:09 executing program 5 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1381.515932][ T1478] FAULT_INJECTION: forcing a failure. [ 1381.515932][ T1478] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.530831][ T1476] /dev/loop0: Can't open blockdev [ 1381.542113][ T1478] CPU: 1 PID: 1478 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1381.547815][ T1485] /dev/loop0: Can't open blockdev [ 1381.550717][ T1478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1381.550722][ T1478] Call Trace: [ 1381.550741][ T1478] dump_stack+0x1fb/0x318 [ 1381.550763][ T1478] should_fail+0x555/0x770 [ 1381.577830][ T1478] __should_failslab+0x11a/0x160 [ 1381.582761][ T1478] should_failslab+0x9/0x20 [ 1381.587246][ T1478] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1381.592511][ T1478] ? legacy_init_fs_context+0x51/0xc0 [ 1381.597864][ T1478] legacy_init_fs_context+0x51/0xc0 [ 1381.603044][ T1478] alloc_fs_context+0x53a/0x640 [ 1381.608238][ T1478] fs_context_for_mount+0x24/0x30 [ 1381.613245][ T1478] do_mount+0x10a7/0x2510 [ 1381.617559][ T1478] ? copy_mount_options+0x308/0x3c0 [ 1381.622745][ T1478] ksys_mount+0xcc/0x100 [ 1381.626968][ T1478] __x64_sys_mount+0xbf/0xd0 [ 1381.631539][ T1478] do_syscall_64+0xf7/0x1c0 [ 1381.636024][ T1478] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1381.641906][ T1478] RIP: 0033:0x45d08a [ 1381.645791][ T1478] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 11:06:09 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'#ser_id'}, 0x2c, {'group_id'}}) [ 1381.665376][ T1478] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1381.673776][ T1478] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1381.681742][ T1478] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1381.689693][ T1478] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1381.697646][ T1478] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1381.705608][ T1478] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:09 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x2}) 11:06:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0xffffffff]}) 11:06:09 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:09 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'%ser_id'}, 0x2c, {'group_id'}}) [ 1381.768076][ T1488] fuseblk: Unknown parameter '#ser_id' [ 1381.784154][ T1490] fuseblk: Unknown parameter '#ser_id' 11:06:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1381.883035][ T1501] fuseblk: Unknown parameter '%ser_id' [ 1381.890554][ T1489] XFS (loop3): Invalid superblock magic number [ 1381.891539][ T1505] fuseblk: Unknown parameter '%ser_id' 11:06:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x900, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:10 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000), 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x464800, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @bt={0x101, 0xfffffffd, 0x2, 0x3ff, 0x7, 0x7, 0x1, 0x1}}) 11:06:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'*ser_id'}, 0x2c, {'group_id'}}) 11:06:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x2]}) 11:06:10 executing program 5 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1382.464934][ T1519] fuseblk: Unknown parameter '*ser_id' [ 1382.518631][ T1617] FAULT_INJECTION: forcing a failure. [ 1382.518631][ T1617] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.524300][ T1635] fuseblk: Unknown parameter '*ser_id' [ 1382.556211][ T1617] CPU: 1 PID: 1617 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 11:06:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x3]}) [ 1382.564841][ T1617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1382.574900][ T1617] Call Trace: [ 1382.578201][ T1617] dump_stack+0x1fb/0x318 [ 1382.582540][ T1617] should_fail+0x555/0x770 [ 1382.586972][ T1617] __should_failslab+0x11a/0x160 [ 1382.591948][ T1617] should_failslab+0x9/0x20 [ 1382.596460][ T1617] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1382.601745][ T1617] ? legacy_init_fs_context+0x51/0xc0 [ 1382.607121][ T1617] legacy_init_fs_context+0x51/0xc0 [ 1382.612327][ T1617] alloc_fs_context+0x53a/0x640 11:06:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'+ser_id'}, 0x2c, {'group_id'}}) [ 1382.617213][ T1617] fs_context_for_mount+0x24/0x30 [ 1382.622236][ T1617] do_mount+0x10a7/0x2510 [ 1382.626574][ T1617] ? copy_mount_options+0x308/0x3c0 [ 1382.631800][ T1617] ksys_mount+0xcc/0x100 [ 1382.636051][ T1617] __x64_sys_mount+0xbf/0xd0 [ 1382.640649][ T1617] do_syscall_64+0xf7/0x1c0 [ 1382.645161][ T1617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1382.651067][ T1617] RIP: 0033:0x45d08a [ 1382.654960][ T1617] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1382.674567][ T1617] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1382.682991][ T1617] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1382.690967][ T1617] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1382.699034][ T1617] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1382.701931][ T1640] fuseblk: Unknown parameter '+ser_id' 11:06:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x4]}) [ 1382.707090][ T1617] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1382.707096][ T1617] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1382.738194][ T1547] XFS (loop3): Invalid superblock magic number 11:06:10 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x9) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="44040000240007e744c01e69dfc8a80000000000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100636271001804020004040600030000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c118ed480000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000042adf84f58572d5f0000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000001000050005000000000000007f00000008c91af67c82576a74dbf80000"], 0x444}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={@mcast2, 0x71, r2}) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1382.776731][ T1643] fuseblk: Unknown parameter '+ser_id' 11:06:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5]}) 11:06:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'-ser_id'}, 0x2c, {'group_id'}}) 11:06:10 executing program 5 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1382.998669][ T1751] fuseblk: Unknown parameter '-ser_id' [ 1383.042280][ T1755] fuseblk: Unknown parameter '-ser_id' 11:06:10 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x6]}) 11:06:10 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'.ser_id'}, 0x2c, {'group_id'}}) [ 1383.216518][ T1758] FAULT_INJECTION: forcing a failure. [ 1383.216518][ T1758] name failslab, interval 1, probability 0, space 0, times 0 [ 1383.260403][ T1763] fuseblk: Unknown parameter '.ser_id' [ 1383.301442][ T1765] fuseblk: Unknown parameter '.ser_id' [ 1383.301705][ T1758] CPU: 1 PID: 1758 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1383.315547][ T1758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1383.325604][ T1758] Call Trace: [ 1383.325629][ T1758] dump_stack+0x1fb/0x318 [ 1383.325651][ T1758] should_fail+0x555/0x770 [ 1383.325669][ T1758] __should_failslab+0x11a/0x160 [ 1383.325682][ T1758] should_failslab+0x9/0x20 11:06:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x7]}) [ 1383.325690][ T1758] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1383.325703][ T1758] ? btrfs_mount_root+0x1b2/0x1040 [ 1383.325716][ T1758] btrfs_mount_root+0x1b2/0x1040 [ 1383.325735][ T1758] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1383.342664][ T1758] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1383.342678][ T1758] ? trace_kfree+0xb2/0x110 [ 1383.342694][ T1758] legacy_get_tree+0xf9/0x1a0 [ 1383.342705][ T1758] ? btrfs_control_open+0x40/0x40 [ 1383.342718][ T1758] vfs_get_tree+0x8b/0x2a0 [ 1383.342732][ T1758] vfs_kern_mount+0xc2/0x160 [ 1383.387725][ T1758] btrfs_mount+0x34f/0x18e0 11:06:11 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'0ser_id'}, 0x2c, {'group_id'}}) [ 1383.387746][ T1758] ? check_preemption_disabled+0x47/0x2a0 [ 1383.387765][ T1758] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1383.387780][ T1758] ? cap_capable+0x250/0x290 [ 1383.416825][ T1758] ? safesetid_security_capable+0x89/0xf0 [ 1383.422572][ T1758] legacy_get_tree+0xf9/0x1a0 [ 1383.427243][ T1758] ? btrfs_resize_thread_pool+0x290/0x290 [ 1383.427257][ T1758] vfs_get_tree+0x8b/0x2a0 [ 1383.427270][ T1758] do_mount+0x16c0/0x2510 [ 1383.427287][ T1758] ? copy_mount_options+0x308/0x3c0 [ 1383.427300][ T1758] ksys_mount+0xcc/0x100 [ 1383.427313][ T1758] __x64_sys_mount+0xbf/0xd0 [ 1383.427328][ T1758] do_syscall_64+0xf7/0x1c0 [ 1383.427342][ T1758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1383.427356][ T1758] RIP: 0033:0x45d08a [ 1383.470318][ T1758] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1383.490799][ T1758] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1383.499236][ T1758] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1383.507328][ T1758] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1383.515308][ T1758] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1383.523309][ T1758] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1383.531406][ T1758] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:11 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'Lser_id'}, 0x2c, {'group_id'}}) [ 1383.565986][ T1773] fuseblk: Unknown parameter '0ser_id' [ 1383.583944][ T1779] fuseblk: Unknown parameter '0ser_id' [ 1383.590232][ T1766] XFS (loop3): Invalid superblock magic number 11:06:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x8]}) 11:06:11 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="04d80adce20f9259329568b6080100ec"}, {0x2, 0x0, 0xfffffffffffffffd, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000, 0x0, 0x4]}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x1f, 0x7, "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", 0x0, 0x3, 0x2, 0x2, 0x40, 0x7, 0x5}, r3}}, 0x120) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:11 executing program 5 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 1383.706028][ T1781] fuseblk: Unknown parameter 'Lser_id' 11:06:11 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x9]}) [ 1383.751209][ T1799] fuseblk: Unknown parameter 'Lser_id' 11:06:11 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eed2", {}, 0x180000}) 11:06:11 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'Xser_id'}, 0x2c, {'group_id'}}) [ 1383.928099][ T1808] fuseblk: Unknown parameter 'Xser_id' [ 1383.962343][ T1814] fuseblk: Unknown parameter 'Xser_id' [ 1383.980638][ T1766] XFS (loop3): Invalid superblock magic number [ 1384.087918][ T1801] FAULT_INJECTION: forcing a failure. [ 1384.087918][ T1801] name failslab, interval 1, probability 0, space 0, times 0 [ 1384.130697][ T1801] CPU: 0 PID: 1801 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1384.139512][ T1801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1384.149582][ T1801] Call Trace: [ 1384.152905][ T1801] dump_stack+0x1fb/0x318 [ 1384.157258][ T1801] should_fail+0x555/0x770 [ 1384.161695][ T1801] __should_failslab+0x11a/0x160 [ 1384.166643][ T1801] ? btrfs_mount_root+0x2f4/0x1040 [ 1384.171768][ T1801] should_failslab+0x9/0x20 [ 1384.176277][ T1801] __kmalloc_track_caller+0x79/0x340 [ 1384.181567][ T1801] kstrdup+0x34/0x70 [ 1384.185489][ T1801] btrfs_mount_root+0x2f4/0x1040 [ 1384.190433][ T1801] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1384.195721][ T1801] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1384.201456][ T1801] ? trace_kfree+0xb2/0x110 [ 1384.205979][ T1801] legacy_get_tree+0xf9/0x1a0 [ 1384.210662][ T1801] ? btrfs_control_open+0x40/0x40 [ 1384.215714][ T1801] vfs_get_tree+0x8b/0x2a0 [ 1384.220132][ T1801] vfs_kern_mount+0xc2/0x160 [ 1384.224733][ T1801] btrfs_mount+0x34f/0x18e0 [ 1384.229246][ T1801] ? check_preemption_disabled+0x47/0x2a0 [ 1384.234981][ T1801] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1384.240272][ T1801] ? cap_capable+0x250/0x290 [ 1384.244876][ T1801] ? safesetid_security_capable+0x89/0xf0 [ 1384.250600][ T1801] legacy_get_tree+0xf9/0x1a0 [ 1384.255297][ T1801] ? btrfs_resize_thread_pool+0x290/0x290 [ 1384.261026][ T1801] vfs_get_tree+0x8b/0x2a0 [ 1384.265595][ T1801] do_mount+0x16c0/0x2510 [ 1384.269936][ T1801] ? copy_mount_options+0x308/0x3c0 [ 1384.275136][ T1801] ksys_mount+0xcc/0x100 [ 1384.279377][ T1801] __x64_sys_mount+0xbf/0xd0 [ 1384.283986][ T1801] do_syscall_64+0xf7/0x1c0 [ 1384.288501][ T1801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1384.294387][ T1801] RIP: 0033:0x45d08a [ 1384.298276][ T1801] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1384.317884][ T1801] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1384.326305][ T1801] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1384.334281][ T1801] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1384.342272][ T1801] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1384.350255][ T1801] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1384.358236][ T1801] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa01, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xa]}) 11:06:12 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'\\ser_id'}, 0x2c, {'group_id'}}) 11:06:12 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000040)={{0x1, 0x4}, 'port0\x00', 0x182, 0x80804, 0x4, 0x2, 0x2, 0x664, 0x4, 0x0, 0x0, 0x1}) 11:06:12 executing program 5 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xb]}) [ 1384.546076][ T1823] fuseblk: Unknown parameter '\ser_id' [ 1384.569828][ T1822] FAULT_INJECTION: forcing a failure. [ 1384.569828][ T1822] name failslab, interval 1, probability 0, space 0, times 0 [ 1384.582790][ T1827] fuseblk: Unknown parameter '\ser_id' [ 1384.609595][ T1822] CPU: 0 PID: 1822 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1384.618239][ T1822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1384.628298][ T1822] Call Trace: [ 1384.631598][ T1822] dump_stack+0x1fb/0x318 [ 1384.635938][ T1822] should_fail+0x555/0x770 [ 1384.640366][ T1822] __should_failslab+0x11a/0x160 [ 1384.645315][ T1822] should_failslab+0x9/0x20 [ 1384.649824][ T1822] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1384.655112][ T1822] ? legacy_init_fs_context+0x51/0xc0 [ 1384.660493][ T1822] legacy_init_fs_context+0x51/0xc0 [ 1384.665882][ T1822] alloc_fs_context+0x53a/0x640 [ 1384.670742][ T1822] fs_context_for_mount+0x24/0x30 [ 1384.675779][ T1822] vfs_kern_mount+0x2c/0x160 [ 1384.680378][ T1822] btrfs_mount+0x34f/0x18e0 [ 1384.684894][ T1822] ? check_preemption_disabled+0x47/0x2a0 [ 1384.690623][ T1822] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1384.695926][ T1822] ? cap_capable+0x250/0x290 [ 1384.701698][ T1822] ? safesetid_security_capable+0x89/0xf0 [ 1384.707431][ T1822] legacy_get_tree+0xf9/0x1a0 [ 1384.712114][ T1822] ? btrfs_resize_thread_pool+0x290/0x290 [ 1384.717844][ T1822] vfs_get_tree+0x8b/0x2a0 [ 1384.722272][ T1822] do_mount+0x16c0/0x2510 [ 1384.726613][ T1822] ? copy_mount_options+0x308/0x3c0 [ 1384.731817][ T1822] ksys_mount+0xcc/0x100 [ 1384.736067][ T1822] __x64_sys_mount+0xbf/0xd0 [ 1384.740667][ T1822] do_syscall_64+0xf7/0x1c0 [ 1384.745179][ T1822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1384.751070][ T1822] RIP: 0033:0x45d08a [ 1384.754959][ T1822] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1384.774565][ T1822] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1384.782985][ T1822] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1384.790967][ T1822] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1384.798950][ T1822] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 11:06:12 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000001c0)=""/72) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x3, 0x50007, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x703000, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x4, 0xbb61, 0x10001}}, 0x30) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f00000000c0)=0x200000, 0x4) 11:06:12 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'cser_id'}, 0x2c, {'group_id'}}) 11:06:12 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xc]}) [ 1384.806930][ T1822] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1384.814906][ T1822] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1384.828713][ T1838] fuseblk: Unknown parameter 'cser_id' 11:06:12 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0xb710, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x2}) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) write$P9_RLERROR(r1, &(0x7f00000000c0)={0x28, 0x7, 0x2, {0x1f, 'vmnet0nodev/bdev+:vmnet1vmnet0}'}}, 0x28) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000140)={0x100000, 0x23000}) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000240)) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r3, 0xc0406619, &(0x7f00000001c0)={{0x4, 0x0, @descriptor="fab50c97a1474472"}}) r4 = syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/ipc\x00') signalfd(r4, &(0x7f0000000080)={0x8}, 0x8) [ 1384.850772][ T1828] XFS (loop3): Invalid superblock magic number [ 1384.884006][ T1843] fuseblk: Unknown parameter 'cser_id' 11:06:12 executing program 5 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:12 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'dser_id'}, 0x2c, {'group_id'}}) [ 1385.014651][ T1849] FAULT_INJECTION: forcing a failure. [ 1385.014651][ T1849] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1385.017063][ T1852] fuseblk: Unknown parameter 'dser_id' [ 1385.028681][ T1849] CPU: 1 PID: 1849 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1385.028688][ T1849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.028693][ T1849] Call Trace: [ 1385.028712][ T1849] dump_stack+0x1fb/0x318 [ 1385.028728][ T1849] should_fail+0x555/0x770 [ 1385.028744][ T1849] should_fail_alloc_page+0x55/0x60 [ 1385.028752][ T1849] prepare_alloc_pages+0x283/0x460 [ 1385.028765][ T1849] __alloc_pages_nodemask+0xb2/0x5d0 [ 1385.028784][ T1849] kmem_getpages+0x4d/0xa00 [ 1385.028795][ T1849] cache_grow_begin+0x7e/0x2c0 [ 1385.028807][ T1849] cache_alloc_refill+0x311/0x3f0 [ 1385.028816][ T1849] ? check_preemption_disabled+0xb7/0x2a0 [ 1385.028830][ T1849] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 1385.028839][ T1849] ? btrfs_mount_root+0x12c/0x1040 [ 1385.028850][ T1849] btrfs_mount_root+0x12c/0x1040 [ 1385.028866][ T1849] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1385.028877][ T1849] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1385.028886][ T1849] ? trace_kfree+0xb2/0x110 [ 1385.028899][ T1849] legacy_get_tree+0xf9/0x1a0 [ 1385.028912][ T1849] ? btrfs_control_open+0x40/0x40 [ 1385.074053][ T1853] fuseblk: Unknown parameter 'dser_id' [ 1385.075274][ T1849] vfs_get_tree+0x8b/0x2a0 [ 1385.075288][ T1849] vfs_kern_mount+0xc2/0x160 [ 1385.075302][ T1849] btrfs_mount+0x34f/0x18e0 [ 1385.075318][ T1849] ? check_preemption_disabled+0x47/0x2a0 [ 1385.075334][ T1849] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1385.171131][ T1849] ? cap_capable+0x250/0x290 [ 1385.175760][ T1849] ? safesetid_security_capable+0x89/0xf0 [ 1385.181495][ T1849] legacy_get_tree+0xf9/0x1a0 [ 1385.186183][ T1849] ? btrfs_resize_thread_pool+0x290/0x290 [ 1385.191920][ T1849] vfs_get_tree+0x8b/0x2a0 [ 1385.196354][ T1849] do_mount+0x16c0/0x2510 [ 1385.200721][ T1849] ? copy_mount_options+0x308/0x3c0 [ 1385.205959][ T1849] ksys_mount+0xcc/0x100 [ 1385.210210][ T1849] __x64_sys_mount+0xbf/0xd0 [ 1385.214812][ T1849] do_syscall_64+0xf7/0x1c0 [ 1385.219334][ T1849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1385.225232][ T1849] RIP: 0033:0x45d08a [ 1385.229132][ T1849] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1385.249307][ T1849] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1385.257723][ T1849] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1385.265705][ T1849] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1385.273686][ T1849] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1385.281671][ T1849] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1385.289648][ T1849] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xb00, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xd]}) 11:06:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'hser_id'}, 0x2c, {'group_id'}}) 11:06:13 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x8000, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {0xc9d7, 0x2}}) 11:06:13 executing program 5 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:13 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) prctl$PR_GET_NAME(0x10, &(0x7f0000000040)=""/157) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) [ 1385.537087][ T1859] fuseblk: Unknown parameter 'hser_id' [ 1385.569408][ T1863] fuseblk: Unknown parameter 'hser_id' 11:06:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe]}) 11:06:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'iser_id'}, 0x2c, {'group_id'}}) [ 1385.584859][ T1861] FAULT_INJECTION: forcing a failure. [ 1385.584859][ T1861] name failslab, interval 1, probability 0, space 0, times 0 [ 1385.676171][ T1861] CPU: 1 PID: 1861 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1385.684801][ T1861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1385.685376][ T1866] XFS (loop3): Invalid superblock magic number [ 1385.694853][ T1861] Call Trace: [ 1385.694874][ T1861] dump_stack+0x1fb/0x318 [ 1385.694893][ T1861] should_fail+0x555/0x770 [ 1385.694912][ T1861] __should_failslab+0x11a/0x160 [ 1385.694923][ T1861] should_failslab+0x9/0x20 [ 1385.694932][ T1861] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1385.694941][ T1861] ? legacy_init_fs_context+0x51/0xc0 [ 1385.694961][ T1861] legacy_init_fs_context+0x51/0xc0 [ 1385.738296][ T1861] alloc_fs_context+0x53a/0x640 [ 1385.743154][ T1861] fs_context_for_mount+0x24/0x30 [ 1385.748175][ T1861] vfs_kern_mount+0x2c/0x160 [ 1385.753008][ T1861] btrfs_mount+0x34f/0x18e0 [ 1385.757620][ T1861] ? check_preemption_disabled+0x47/0x2a0 [ 1385.763353][ T1861] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1385.768638][ T1861] ? cap_capable+0x250/0x290 11:06:13 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x2000) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000140)=""/188) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1385.773231][ T1861] ? safesetid_security_capable+0x89/0xf0 [ 1385.778956][ T1861] legacy_get_tree+0xf9/0x1a0 [ 1385.783637][ T1861] ? btrfs_resize_thread_pool+0x290/0x290 [ 1385.789361][ T1861] vfs_get_tree+0x8b/0x2a0 [ 1385.793786][ T1861] do_mount+0x16c0/0x2510 [ 1385.798128][ T1861] ? copy_mount_options+0x308/0x3c0 [ 1385.803329][ T1861] ksys_mount+0xcc/0x100 [ 1385.807572][ T1861] __x64_sys_mount+0xbf/0xd0 [ 1385.812162][ T1861] do_syscall_64+0xf7/0x1c0 [ 1385.816668][ T1861] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1385.822559][ T1861] RIP: 0033:0x45d08a [ 1385.826455][ T1861] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1385.846076][ T1861] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1385.854502][ T1861] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1385.862491][ T1861] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 11:06:13 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x10]}) [ 1385.870466][ T1861] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1385.878448][ T1861] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1385.886429][ T1861] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:13 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000040)={0x1e, 0x9, 0x29}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r2, 0x800000c0045009, &(0x7f0000000180)) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000140)={0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:13 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'lser_id'}, 0x2c, {'group_id'}}) [ 1385.939898][ T2081] fuseblk: Unknown parameter 'iser_id' [ 1385.961235][ T2083] fuseblk: Unknown parameter 'iser_id' [ 1386.113799][ T2140] fuseblk: Unknown parameter 'lser_id' [ 1386.144218][ T2188] fuseblk: Unknown parameter 'lser_id' 11:06:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc00, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:14 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000140)={0xcc, ""/204}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x11]}) 11:06:14 executing program 5 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:14 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'oser_id'}, 0x2c, {'group_id'}}) [ 1386.535195][ T2245] FAULT_INJECTION: forcing a failure. [ 1386.535195][ T2245] name failslab, interval 1, probability 0, space 0, times 0 [ 1386.549542][ T2245] CPU: 0 PID: 2245 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1386.558137][ T2245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1386.568195][ T2245] Call Trace: [ 1386.571490][ T2245] dump_stack+0x1fb/0x318 [ 1386.575828][ T2245] should_fail+0x555/0x770 [ 1386.580250][ T2245] __should_failslab+0x11a/0x160 [ 1386.585189][ T2245] ? getname_kernel+0x59/0x2f0 [ 1386.589950][ T2245] should_failslab+0x9/0x20 [ 1386.594445][ T2245] kmem_cache_alloc+0x56/0x2e0 [ 1386.599215][ T2245] getname_kernel+0x59/0x2f0 [ 1386.603810][ T2245] kern_path+0x1f/0x40 [ 1386.607877][ T2245] blkdev_get_by_path+0x71/0x270 [ 1386.612927][ T2245] btrfs_scan_one_device+0xbd/0x450 [ 1386.618130][ T2245] ? btrfs_mount_root+0x477/0x1040 [ 1386.623239][ T2245] ? trace_hardirqs_on+0x74/0x80 [ 1386.628174][ T2245] btrfs_mount_root+0x4af/0x1040 [ 1386.633114][ T2245] ? trace_kfree+0xb2/0x110 [ 1386.637615][ T2245] legacy_get_tree+0xf9/0x1a0 [ 1386.642285][ T2245] ? btrfs_control_open+0x40/0x40 [ 1386.647309][ T2245] vfs_get_tree+0x8b/0x2a0 [ 1386.651809][ T2245] vfs_kern_mount+0xc2/0x160 [ 1386.656402][ T2245] btrfs_mount+0x34f/0x18e0 [ 1386.660910][ T2245] ? check_preemption_disabled+0x47/0x2a0 [ 1386.666634][ T2245] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1386.671920][ T2245] ? cap_capable+0x250/0x290 [ 1386.676509][ T2245] ? safesetid_security_capable+0x89/0xf0 [ 1386.682230][ T2245] legacy_get_tree+0xf9/0x1a0 [ 1386.686902][ T2245] ? btrfs_resize_thread_pool+0x290/0x290 [ 1386.692616][ T2245] vfs_get_tree+0x8b/0x2a0 [ 1386.697036][ T2245] do_mount+0x16c0/0x2510 [ 1386.701373][ T2245] ? copy_mount_options+0x308/0x3c0 [ 1386.706574][ T2245] ksys_mount+0xcc/0x100 [ 1386.710819][ T2245] __x64_sys_mount+0xbf/0xd0 [ 1386.715421][ T2245] do_syscall_64+0xf7/0x1c0 [ 1386.719929][ T2245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1386.725813][ T2245] RIP: 0033:0x45d08a [ 1386.729700][ T2245] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1386.749308][ T2245] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1386.757724][ T2245] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1386.765699][ T2245] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1386.773686][ T2245] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 11:06:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x12]}) [ 1386.781919][ T2245] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1386.789892][ T2245] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:14 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x3, 0x7fff, 0x2, 0x3c31, 0xa, 0x0, 0x40, 0x4, 0xf0, 0x4, 0x1, 0x835}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:14 executing program 5 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:14 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x14]}) 11:06:14 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'pser_id'}, 0x2c, {'group_id'}}) [ 1386.834367][ T2305] fuseblk: Unknown parameter 'oser_id' [ 1386.856513][ T2249] XFS (loop3): Invalid superblock magic number [ 1386.944185][ T2320] fuseblk: Unknown parameter 'pser_id' [ 1386.973457][ T2350] FAULT_INJECTION: forcing a failure. [ 1386.973457][ T2350] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1386.988084][ T2391] fuseblk: Unknown parameter 'pser_id' [ 1387.034074][ T2350] CPU: 0 PID: 2350 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1387.042687][ T2350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1387.042703][ T2350] Call Trace: [ 1387.042721][ T2350] dump_stack+0x1fb/0x318 [ 1387.042738][ T2350] should_fail+0x555/0x770 [ 1387.042756][ T2350] should_fail_alloc_page+0x55/0x60 [ 1387.042766][ T2350] prepare_alloc_pages+0x283/0x460 [ 1387.042781][ T2350] __alloc_pages_nodemask+0xb2/0x5d0 [ 1387.042794][ T2350] ? rcu_lock_release+0x26/0x30 [ 1387.042812][ T2350] alloc_pages_current+0x2db/0x500 [ 1387.042825][ T2350] __page_cache_alloc+0x7d/0x1e0 [ 1387.090839][ T2350] do_read_cache_page+0x1f8/0xcb0 [ 1387.090855][ T2350] read_cache_page_gfp+0x29/0x30 [ 1387.090869][ T2350] btrfs_scan_one_device+0x16a/0x450 [ 1387.110988][ T2350] ? trace_hardirqs_on+0x74/0x80 [ 1387.115921][ T2350] btrfs_mount_root+0x4af/0x1040 [ 1387.120858][ T2350] ? trace_kfree+0xb2/0x110 [ 1387.125360][ T2350] legacy_get_tree+0xf9/0x1a0 [ 1387.130032][ T2350] ? btrfs_control_open+0x40/0x40 [ 1387.135051][ T2350] vfs_get_tree+0x8b/0x2a0 [ 1387.139464][ T2350] vfs_kern_mount+0xc2/0x160 [ 1387.144051][ T2350] btrfs_mount+0x34f/0x18e0 [ 1387.148563][ T2350] ? check_preemption_disabled+0x47/0x2a0 [ 1387.154284][ T2350] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1387.159568][ T2350] ? cap_capable+0x250/0x290 [ 1387.164156][ T2350] ? safesetid_security_capable+0x89/0xf0 [ 1387.169880][ T2350] legacy_get_tree+0xf9/0x1a0 [ 1387.174558][ T2350] ? btrfs_resize_thread_pool+0x290/0x290 [ 1387.180288][ T2350] vfs_get_tree+0x8b/0x2a0 [ 1387.184792][ T2350] do_mount+0x16c0/0x2510 [ 1387.189119][ T2350] ? copy_mount_options+0x278/0x3c0 [ 1387.194385][ T2350] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x90 [ 1387.200761][ T2350] ? copy_mount_options+0x308/0x3c0 [ 1387.205962][ T2350] ksys_mount+0xcc/0x100 [ 1387.210207][ T2350] __x64_sys_mount+0xbf/0xd0 [ 1387.214800][ T2350] do_syscall_64+0xf7/0x1c0 [ 1387.219302][ T2350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1387.225180][ T2350] RIP: 0033:0x45d08a [ 1387.229066][ T2350] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1387.248666][ T2350] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1387.257071][ T2350] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1387.265041][ T2350] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1387.273168][ T2350] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 11:06:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x1e]}) 11:06:15 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'sser_id'}, 0x2c, {'group_id'}}) [ 1387.281157][ T2350] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1387.289163][ T2350] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1387.384656][ T2429] fuseblk: Unknown parameter 'sser_id' [ 1387.413595][ T2430] fuseblk: Unknown parameter 'sser_id' 11:06:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd00, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x25]}) 11:06:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) 11:06:15 executing program 5 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:15 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'tser_id'}, 0x2c, {'group_id'}}) 11:06:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x5c]}) 11:06:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x2003, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1387.631029][ T2438] fuseblk: Unknown parameter 'tser_id' 11:06:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1387.677120][ T2446] fuseblk: Unknown parameter 'tser_id' [ 1387.708161][ T2439] XFS (loop3): Invalid superblock magic number 11:06:15 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'xser_id'}, 0x2c, {'group_id'}}) 11:06:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe7]}) 11:06:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x300]}) [ 1387.863405][ T2481] fuseblk: Unknown parameter 'xser_id' [ 1387.890030][ T2559] fuseblk: Unknown parameter 'xser_id' 11:06:15 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'zser_id'}, 0x2c, {'group_id'}}) [ 1388.059919][ T2571] fuseblk: Unknown parameter 'zser_id' [ 1388.095738][ T2574] fuseblk: Unknown parameter 'zser_id' 11:06:15 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0xe00, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:15 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x500]}) 11:06:15 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000040)=0x1) ioctl$int_in(r1, 0x800000c0045009, &(0x7f0000000180)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000040)=0xe8) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, r2) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@mask_fadd={0x58, 0x114, 0x8, {{}, 0xfffffffffffffffe, 0x0}}], 0x58}, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000400)={0x1, 0x1, 0x1000, 0xdc, &(0x7f0000000240)="09c23093a7979281f186663ef1ff5e4404d3db88c4d425bebbbeba10d6f35461a9d9bd09cc5308a43d4d273345ada5764fd9a8b8120876fe7caa7dd94fc9195a2bd4b6644fc780bf8232eeeb14cf2442f879fdf86b781c9ff20e02c127cfcf503702fcb2b338a06b301dd304dba5d1904b5c496a2ddf20b3b11c350ca4ebaac1fdc161e4c1fd6580c665f7c033e8a0e719fec567f523d651a2f7a717277c2534116d6a6cf04c35a47181a402610427a8f08591551054167c330f0618a7af8419fabca93f6fb0884d663f4f55868f362204e58cc9bc1800d3b7a9b225", 0x9a, 0x0, &(0x7f0000000340)="79070d04e2602ec8c6cd1fd370689fcbcbc83f5ec0e419d899a31bd8567d0e8b9267c1e3741b8809a8336c4156e00145dea1a42d553ed2d831769957632307c690c530b354dbcd9673e29db3b0cd9e7c6ca52a394015498d30af411b3220bebe1d9ac098e70a9d382d3b43b0e76525ef9e961392fec8243268942e0a9d9e9574bc6f10194ad235513969bb3942014248b735fba7811b449f320b"}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1388.310359][ T2575] FAULT_INJECTION: forcing a failure. [ 1388.310359][ T2575] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.348936][ T2575] CPU: 1 PID: 2575 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1388.357583][ T2575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.367644][ T2575] Call Trace: [ 1388.370935][ T2575] dump_stack+0x1fb/0x318 [ 1388.375390][ T2575] should_fail+0x555/0x770 [ 1388.379828][ T2575] __should_failslab+0x11a/0x160 [ 1388.384779][ T2575] should_failslab+0x9/0x20 [ 1388.389306][ T2575] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 1388.395047][ T2575] ? __kmalloc_node+0x3c/0x60 [ 1388.399765][ T2575] ? smack_sb_eat_lsm_opts+0x867/0xa20 [ 1388.405231][ T2575] __kmalloc_node+0x3c/0x60 [ 1388.409743][ T2575] kvmalloc_node+0xcc/0x130 [ 1388.414254][ T2575] btrfs_mount_root+0xe3/0x1040 [ 1388.419112][ T2575] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1388.424400][ T2575] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1388.430210][ T2575] ? trace_kfree+0xb2/0x110 [ 1388.434725][ T2575] legacy_get_tree+0xf9/0x1a0 [ 1388.439407][ T2575] ? btrfs_control_open+0x40/0x40 [ 1388.444438][ T2575] vfs_get_tree+0x8b/0x2a0 [ 1388.448887][ T2575] vfs_kern_mount+0xc2/0x160 [ 1388.453511][ T2575] btrfs_mount+0x34f/0x18e0 [ 1388.458056][ T2575] ? check_preemption_disabled+0x47/0x2a0 [ 1388.463782][ T2575] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1388.469067][ T2575] ? cap_capable+0x250/0x290 [ 1388.473691][ T2575] ? safesetid_security_capable+0x89/0xf0 [ 1388.479419][ T2575] legacy_get_tree+0xf9/0x1a0 [ 1388.484099][ T2575] ? btrfs_resize_thread_pool+0x290/0x290 [ 1388.489831][ T2575] vfs_get_tree+0x8b/0x2a0 [ 1388.494260][ T2575] do_mount+0x16c0/0x2510 [ 1388.498613][ T2575] ? copy_mount_options+0x308/0x3c0 [ 1388.503827][ T2575] ksys_mount+0xcc/0x100 [ 1388.508080][ T2575] __x64_sys_mount+0xbf/0xd0 [ 1388.512680][ T2575] do_syscall_64+0xf7/0x1c0 [ 1388.517208][ T2575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1388.523103][ T2575] RIP: 0033:0x45d08a [ 1388.527006][ T2575] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1388.546612][ T2575] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1388.555041][ T2575] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1388.563052][ T2575] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1388.571146][ T2575] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1388.579125][ T2575] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1388.587124][ T2575] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 [ 1388.624487][ T2583] XFS (loop3): Invalid superblock magic number 11:06:16 executing program 5 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u#er_id'}, 0x2c, {'group_id'}}) 11:06:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x600]}) 11:06:16 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) getpeername(r0, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80) [ 1388.773908][ T2597] fuseblk: Unknown parameter 'u#er_id' 11:06:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x700]}) 11:06:16 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000140)={0x0, 0x0, @ioapic}) [ 1388.827759][ T2703] fuseblk: Unknown parameter 'u#er_id' [ 1388.855342][ T2674] FAULT_INJECTION: forcing a failure. [ 1388.855342][ T2674] name failslab, interval 1, probability 0, space 0, times 0 [ 1388.869219][ T2674] CPU: 0 PID: 2674 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1388.877920][ T2674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1388.887979][ T2674] Call Trace: [ 1388.891276][ T2674] dump_stack+0x1fb/0x318 [ 1388.895605][ T2674] should_fail+0x555/0x770 [ 1388.895624][ T2674] __should_failslab+0x11a/0x160 [ 1388.895637][ T2674] should_failslab+0x9/0x20 [ 1388.895650][ T2674] kmem_cache_alloc_trace+0x5d/0x2f0 [ 1388.914740][ T2674] ? btrfs_mount_root+0x1b2/0x1040 [ 1388.919849][ T2674] btrfs_mount_root+0x1b2/0x1040 [ 1388.924793][ T2674] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1388.930078][ T2674] ? rcu_read_lock_sched_held+0x10b/0x170 [ 1388.935795][ T2674] ? trace_kfree+0xb2/0x110 [ 1388.940312][ T2674] legacy_get_tree+0xf9/0x1a0 [ 1388.945004][ T2674] ? btrfs_control_open+0x40/0x40 [ 1388.950041][ T2674] vfs_get_tree+0x8b/0x2a0 [ 1388.954459][ T2674] vfs_kern_mount+0xc2/0x160 [ 1388.959055][ T2674] btrfs_mount+0x34f/0x18e0 [ 1388.963568][ T2674] ? check_preemption_disabled+0x47/0x2a0 [ 1388.969297][ T2674] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1388.974586][ T2674] ? cap_capable+0x250/0x290 [ 1388.979181][ T2674] ? safesetid_security_capable+0x89/0xf0 [ 1388.984913][ T2674] legacy_get_tree+0xf9/0x1a0 [ 1388.989598][ T2674] ? btrfs_resize_thread_pool+0x290/0x290 [ 1388.995331][ T2674] vfs_get_tree+0x8b/0x2a0 [ 1388.999753][ T2674] do_mount+0x16c0/0x2510 [ 1389.004094][ T2674] ? copy_mount_options+0x308/0x3c0 [ 1389.009302][ T2674] ksys_mount+0xcc/0x100 [ 1389.013550][ T2674] __x64_sys_mount+0xbf/0xd0 [ 1389.018144][ T2674] do_syscall_64+0xf7/0x1c0 [ 1389.022649][ T2674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1389.028540][ T2674] RIP: 0033:0x45d08a [ 1389.032437][ T2674] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1389.052131][ T2674] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1389.060567][ T2674] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1389.068549][ T2674] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 11:06:16 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u%er_id'}, 0x2c, {'group_id'}}) [ 1389.076538][ T2674] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1389.084518][ T2674] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1389.092497][ T2674] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:16 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0x900]}) 11:06:16 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad20000e5edc4c5dc319ff3eec200", {0x7}}) [ 1389.168486][ T2813] fuseblk: Unknown parameter 'u%er_id' [ 1389.183896][ T2820] fuseblk: Unknown parameter 'u%er_id' 11:06:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) 11:06:17 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u*er_id'}, 0x2c, {'group_id'}}) 11:06:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xa00]}) 11:06:17 executing program 5 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{&(0x7f00000007c0)="8da4363ac0ed020000000000001a004d010000000008000000007a0000000000fff6f2a2299748aeb81e1b00b128fd9a000001000000000001ffffff070000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 11:06:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0xf904f9, "5abac6608de17a3a0b52e5edc4c5dc319ff3eec200", {0x3, 0xd8}, 0x200}) waitid$P_PIDFD(0x3, r0, &(0x7f0000000040), 0x2, &(0x7f0000000140)) fcntl$getflags(0xffffffffffffffff, 0x0) 11:06:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xb00]}) [ 1389.385879][ T2828] fuseblk: Unknown parameter 'u*er_id' [ 1389.457144][ T2832] fuseblk: Unknown parameter 'u*er_id' 11:06:17 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u+er_id'}, 0x2c, {'group_id'}}) 11:06:17 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xc00]}) 11:06:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x211) [ 1389.558740][ T2939] FAULT_INJECTION: forcing a failure. [ 1389.558740][ T2939] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.596948][ T2939] CPU: 1 PID: 2939 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1389.605586][ T2939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.615647][ T2939] Call Trace: [ 1389.618945][ T2939] dump_stack+0x1fb/0x318 [ 1389.623281][ T2939] should_fail+0x555/0x770 [ 1389.627701][ T2939] __should_failslab+0x11a/0x160 [ 1389.632741][ T2939] ? bio_alloc_bioset+0x126/0x5e0 [ 1389.637769][ T2939] should_failslab+0x9/0x20 [ 1389.642274][ T2939] __kmalloc+0x7a/0x340 [ 1389.646433][ T2939] bio_alloc_bioset+0x126/0x5e0 [ 1389.651288][ T2939] ? trace_kmalloc+0xcd/0x130 [ 1389.655980][ T2939] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 1389.661535][ T2939] btrfs_alloc_device+0xa7/0x580 [ 1389.666475][ T2939] ? blkdev_put+0x2c8/0x3b0 [ 1389.671165][ T2939] close_fs_devices+0x4ae/0x8d0 [ 1389.676033][ T2939] btrfs_close_devices+0x33/0x130 [ 1389.681066][ T2939] btrfs_mount_root+0xa9d/0x1040 [ 1389.686016][ T2939] ? trace_kfree+0xb2/0x110 [ 1389.690521][ T2939] legacy_get_tree+0xf9/0x1a0 [ 1389.695193][ T2939] ? btrfs_control_open+0x40/0x40 [ 1389.700213][ T2939] vfs_get_tree+0x8b/0x2a0 [ 1389.704624][ T2939] vfs_kern_mount+0xc2/0x160 [ 1389.709211][ T2939] btrfs_mount+0x34f/0x18e0 [ 1389.713715][ T2939] ? check_preemption_disabled+0x47/0x2a0 [ 1389.719440][ T2939] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1389.724728][ T2939] ? cap_capable+0x250/0x290 [ 1389.729313][ T2939] ? safesetid_security_capable+0x89/0xf0 [ 1389.735031][ T2939] legacy_get_tree+0xf9/0x1a0 [ 1389.739703][ T2939] ? btrfs_resize_thread_pool+0x290/0x290 [ 1389.745423][ T2939] vfs_get_tree+0x8b/0x2a0 [ 1389.749842][ T2939] do_mount+0x16c0/0x2510 [ 1389.754259][ T2939] ? copy_mount_options+0x308/0x3c0 [ 1389.759451][ T2939] ksys_mount+0xcc/0x100 [ 1389.763689][ T2939] __x64_sys_mount+0xbf/0xd0 [ 1389.768295][ T2939] do_syscall_64+0xf7/0x1c0 [ 1389.772802][ T2939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1389.778689][ T2939] RIP: 0033:0x45d08a [ 1389.782587][ T2939] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1389.802186][ T2939] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1389.810773][ T2939] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1389.818742][ T2939] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1389.826710][ T2939] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1389.834675][ T2939] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1389.842640][ T2939] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:17 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x3, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x804000, 0x0) 11:06:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1100, &(0x7f00000014c0)={[{@nodiscard='nodiscard'}]}) [ 1389.865636][ T2939] ------------[ cut here ]------------ [ 1389.871124][ T2939] kernel BUG at fs/btrfs/volumes.c:1266! [ 1389.882744][ T2949] fuseblk: Unknown parameter 'u+er_id' [ 1389.911670][ T2939] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1389.915201][ T3906] kobject: 'loop3' (0000000009fde76e): kobject_uevent_env [ 1389.917766][ T2939] CPU: 1 PID: 2939 Comm: syz-executor.5 Not tainted 5.4.0-rc8-syzkaller #0 [ 1389.917776][ T2939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1389.917793][ T2939] RIP: 0010:close_fs_devices+0x8c1/0x8d0 [ 1389.917805][ T2939] Code: 70 f9 fe 48 8b 5d c0 e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 59 70 f9 fe e9 7a ff ff ff e8 3f 2d c0 fe <0f> 0b e8 38 2d c0 fe 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 [ 1389.949098][ T3906] kobject: 'loop3' (0000000009fde76e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1389.949421][ T2939] RSP: 0018:ffff88809a67f9a0 EFLAGS: 00010246 [ 1389.949429][ T2939] RAX: ffffffff82b34a11 RBX: ffff88805d8950e8 RCX: 0000000000040000 [ 1389.949435][ T2939] RDX: ffffc900109ba000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1389.949439][ T2939] RBP: ffff88809a67fa30 R08: ffff8880a1852cd8 R09: fffffbfff12bc2ce [ 1389.949450][ T2939] R10: fffffbfff12bc2ce R11: 0000000000000000 R12: dffffc0000000000 [ 1390.016583][ T3906] kobject: 'loop3' (0000000009fde76e): kobject_uevent_env [ 1390.017324][ T2939] R13: ffff88805d8950f0 R14: ffff88805d895000 R15: ffff8880a7561400 [ 1390.017332][ T2939] FS: 00007f1d3e744700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 1390.017339][ T2939] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1390.017344][ T2939] CR2: 00000000004d2c90 CR3: 00000000a847f000 CR4: 00000000001426e0 [ 1390.017352][ T2939] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1390.017357][ T2939] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1390.017361][ T2939] Call Trace: [ 1390.017386][ T2939] btrfs_close_devices+0x33/0x130 [ 1390.044382][ T3906] kobject: 'loop3' (0000000009fde76e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1390.047942][ T2939] btrfs_mount_root+0xa9d/0x1040 [ 1390.047957][ T2939] ? trace_kfree+0xb2/0x110 [ 1390.047969][ T2939] legacy_get_tree+0xf9/0x1a0 [ 1390.047975][ T2939] ? btrfs_control_open+0x40/0x40 [ 1390.047990][ T2939] vfs_get_tree+0x8b/0x2a0 [ 1390.113859][ T2939] vfs_kern_mount+0xc2/0x160 [ 1390.118456][ T2939] btrfs_mount+0x34f/0x18e0 [ 1390.122974][ T2939] ? check_preemption_disabled+0x47/0x2a0 [ 1390.128700][ T2939] ? vfs_parse_fs_string+0x13b/0x1a0 [ 1390.133998][ T2939] ? cap_capable+0x250/0x290 [ 1390.138595][ T2939] ? safesetid_security_capable+0x89/0xf0 [ 1390.144319][ T2939] legacy_get_tree+0xf9/0x1a0 [ 1390.149008][ T2939] ? btrfs_resize_thread_pool+0x290/0x290 [ 1390.154730][ T2939] vfs_get_tree+0x8b/0x2a0 [ 1390.159152][ T2939] do_mount+0x16c0/0x2510 [ 1390.163485][ T2939] ? copy_mount_options+0x308/0x3c0 [ 1390.168687][ T2939] ksys_mount+0xcc/0x100 [ 1390.172931][ T2939] __x64_sys_mount+0xbf/0xd0 [ 1390.177525][ T2939] do_syscall_64+0xf7/0x1c0 [ 1390.182032][ T2939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1390.187919][ T2939] RIP: 0033:0x45d08a [ 1390.191817][ T2939] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1390.211421][ T2939] RSP: 002b:00007f1d3e743a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1390.219833][ T2939] RAX: ffffffffffffffda RBX: 00007f1d3e743b40 RCX: 000000000045d08a [ 1390.227987][ T2939] RDX: 00007f1d3e743ae0 RSI: 0000000020000100 RDI: 00007f1d3e743b00 [ 1390.235960][ T2939] RBP: 0000000000000001 R08: 00007f1d3e743b40 R09: 00007f1d3e743ae0 [ 1390.243934][ T2939] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1390.251910][ T2939] R13: 00000000004ca013 R14: 00000000004e1f98 R15: 0000000000000003 11:06:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xd00]}) 11:06:18 executing program 0: open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) mount$fuseblk(&(0x7f00000000c0)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x0, &(0x7f0000000880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'u-er_id'}, 0x2c, {'group_id'}}) [ 1390.259895][ T2939] Modules linked in: [ 1390.280266][ T3056] kobject: 'loop3' (0000000009fde76e): kobject_uevent_env [ 1390.283976][ T2939] ---[ end trace d50681b0090eec5b ]--- [ 1390.293091][ T2939] RIP: 0010:close_fs_devices+0x8c1/0x8d0 [ 1390.299083][ T2939] Code: 70 f9 fe 48 8b 5d c0 e9 73 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 7c 87 48 89 df e8 59 70 f9 fe e9 7a ff ff ff e8 3f 2d c0 fe <0f> 0b e8 38 2d c0 fe 0f 0b 66 0f 1f 44 00 00 55 48 89 e5 41 57 41 [ 1390.319076][ T2939] RSP: 0018:ffff88809a67f9a0 EFLAGS: 00010246 [ 1390.325367][ T2939] RAX: ffffffff82b34a11 RBX: ffff88805d8950e8 RCX: 0000000000040000 [ 1390.333753][ T2939] RDX: ffffc900109ba000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1390.334556][ T3906] kobject: 'loop5' (00000000e19323f8): kobject_uevent_env [ 1390.342007][ T2939] RBP: ffff88809a67fa30 R08: ffff8880a1852cd8 R09: fffffbfff12bc2ce [ 1390.357597][ T2939] R10: fffffbfff12bc2ce R11: 0000000000000000 R12: dffffc0000000000 [ 1390.358246][ T3056] kobject: 'loop3' (0000000009fde76e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1390.389804][ T3069] fuseblk: Unknown parameter 'u-er_id' [ 1390.406124][ T3906] kobject: 'loop5' (00000000e19323f8): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1390.416485][ T2939] R13: ffff88805d8950f0 R14: ffff88805d895000 R15: ffff8880a7561400 [ 1390.428867][ T3184] fuseblk: Unknown parameter 'u-er_id' [ 1390.441253][ T3906] kobject: 'loop2' (0000000029f85d51): kobject_uevent_env [ 1390.449682][ T2939] FS: 00007f1d3e744700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 11:06:18 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x14, 0x0, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2", {}, 0x0, [0x0, 0x0, 0x0, 0xe00]}) [ 1390.466422][ T3906] kobject: 'loop2' (0000000029f85d51): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1390.480003][ T2939] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1390.481848][ T3056] kobject: 'loop3' (0000000009fde76e): kobject_uevent_env [ 1390.495490][ T2939] CR2: 000000000075c000 CR3: 00000000a847f000 CR4: 00000000001426e0 11:06:18 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000040)) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000180)) ioctl$int_in(0xffffffffffffffff, 0x800000c0045009, &(0x7f0000000040)=0x1) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800000c0045009, &(0x7f0000000180)) ioctl$VIDIOC_ENUMSTD(0xffffffffffffffff, 0xc0485619, &(0x7f0000000100)={0x4, 0x800000, "5a4eaad23bbac6608de17a3a0b52e5edc4c5dc319ff3eec2"}) [ 1390.510285][ T3056] kobject: 'loop3' (0000000009fde76e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1390.516298][ T2939] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1390.535194][ T3906] kobject: 'loop3' (0000000009fde76e): kobject_uevent_env [ 1390.544774][ T3906] kobject: 'loop3' (0000000009fde76e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1390.554070][ T3056] kobject: 'loop3' (0000000009fde76e): kobject_uevent_env [ 1390.573934][ T3056] kobject: 'loop3' (0000000009fde76e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1390.584355][ T2939] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1390.601769][ T2939] Kernel panic - not syncing: Fatal exception [ 1390.609344][ T2939] Kernel Offset: disabled [ 1390.613668][ T2939] Rebooting in 86400 seconds..