00000000c0)={0x3, 0x7}) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000100)={0x1, "a0a5b4c507b8c60efac640f9a9ca730e18fee55ebd487d84c263294130a10e37", 0x7}) r1 = open(0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000040)={0x1, "b9f2ded8702e6687c0994b05370728ae6f169f8f0d23ee2966e80fd0599e03b3", 0x1, 0x3}) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000140)={0x800, 0x5, 0x0, [{0x1, 0x22, 0x11efaaeb, 0x8, 0x4, 0x70000000000, 0x9}, {0x2, 0x7ff, 0x83f5, 0x3, 0x9dd9, 0x7fff, 0x5}, {0x8, 0x7, 0xfffffffffffffffb, 0x0, 0x0, 0x9143, 0x9}, {0x1ff, 0x7, 0x79df, 0x20, 0x3, 0xfff, 0x3}, {0x7, 0xfffffffffffffffd, 0x5b, 0xfffffffffffffff8, 0x8001, 0x0, 0x1e2e20dc}]}) 05:23:05 executing program 5: [ 334.563516][T19695] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:05 executing program 2: 05:23:05 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:05 executing program 3: 05:23:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:06 executing program 5: 05:23:06 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000040)=""/50, &(0x7f0000000080)=0x32) 05:23:06 executing program 2: 05:23:06 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:06 executing program 3: [ 334.981788][T19823] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:06 executing program 5: 05:23:06 executing program 2: 05:23:06 executing program 3: 05:23:06 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:06 executing program 5: 05:23:06 executing program 2: 05:23:06 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x40000, 0x100) 05:23:06 executing program 3: 05:23:06 executing program 2: 05:23:06 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:06 executing program 5: 05:23:06 executing program 3: 05:23:06 executing program 2: [ 335.554491][T19961] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:07 executing program 2: 05:23:07 executing program 5: 05:23:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xff00000000000000, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:07 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:07 executing program 3: 05:23:07 executing program 4: r0 = memfd_create(&(0x7f0000000080)='&lo(#securitylo\x00', 0x7) unshare(0x2000400) r1 = socket$packet(0x11, 0x2, 0x300) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") lseek(r0, 0x0, 0x3) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x8000, 0x3e5800) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f00000000c0)={0x0, 0xfffffffffffffc01, 0x4, 0x9}) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:07 executing program 2: 05:23:07 executing program 3: 05:23:07 executing program 5: 05:23:07 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:07 executing program 2: [ 336.049340][T20092] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:07 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x4000, 0x0) syz_mount_image$vfat(&(0x7f0000000800)='vfat\x00', &(0x7f0000000840)='./bus\x00', 0x1, 0x7, &(0x7f0000000dc0)=[{&(0x7f0000000880)="c50acc0bc8ef92d4ec45621b13e95700abdb2b9b7a7021b9e59707443714387b1f70d3b77f6e1db8ea2f46dbbd0c0582951efe2d0f92b05282b8a9785c21b8fb5f7c7d1dceeec26d946d8fd153661e55cb0b2cee4d8b6a1203a62bbe377f7699166cb2392dde2e11c2016a77cc24cbd5a23355c956dc3700fd6529e0d5fbbbbcf16cffb8e4947dd73f436a23aa1e704d693b4d6ca0b9e74ec3ebacbfa0219313d22759046078812ce730f03a4b6b4a30ec623f2894a11117e496a12346f33b85d623e813eb9b94f5a98fb8e47ebe6dd980c184db176a145ae27a14abae1338ec9e5b14e12d34dd9a", 0xe8, 0xcc31}, {&(0x7f0000000980)="422ff54ffab62b3fcca28f87338c8a3979c6ca59630e82871b5c0384ea6d0f97fa51a9bd6864a926ffd2956e9587e25210dd81537df5fd4edf7aa8934f37119ce6eaaca4604ef23625f909bee68bb99295dd31aa81a6ae2babbe1e0a364c523d70f8b3b76e0dc47b22ec930b5c750d2598e2b09e31d574d8757d26bbb64375c96e7e393a29d487c5826605e6cef801406ca4da86f090db3ee87fa62c6430c511aaae87ffda0b70f04320b6386157644e03dca4869f162c9003fea6cbd3b15c13e7df4507f4edb3fc7c304d1bfe100846bd5b8787d37edf87182d45331429e46cdce1097f", 0xe4, 0xc3}, {&(0x7f0000000a80)="cc6a0c5e6cca8075e18a440bee9dda9b723babc701e435b16f30161080c11adc71871949f40580b88ff893020c7404e5e385", 0x32, 0x2}, {&(0x7f0000000ac0)="fae8b3dba1cabbdbf8d7a0293012b36dc50b4299d2657b02644126ba6d8f3b97dca8fbecc74aa9138add9fc85e4e0ee38caa36bfa064bfc8ebea36457c1586345b4ef0f6cd06cf40185d065f8b87a3b370df8e0b4393b637a0a8a008046a83c9ddb81089b5a2db26172d49dd9bf225581b63828f6c887cedf72e50fe552c08a83a549b0938a28ce0ade2df9871f594479b4144aa3f0c036c84529c8e46b7894542eac7", 0xa3, 0x2}, {&(0x7f0000000b80)="41c60d56c9f6582ac9a1fc22be3166d19c9a92888438a7bf5d13e9022480289d50715ee0bfb6bc6ddf215873956d1ad7ac17541943618d4ae52d81b0acc2cc3f0c4083101de15f6b617bcaf1063fb1b0adeb061c654e301bd9f647fadb08cb994412d4bee7a65bdf6672487a4a7c60d3ee0a3d8af52d8170b956d2be03d617466e5a9807cfc490bf66e411f75077f8cc0c94175904", 0x95, 0x6}, {&(0x7f0000000c40)="f0490164b1009fe02408bb76abf37ab873dfd813afaf1df4eb4dd96fb22479d91b998ab086215c82608118bc33b81d05d9ecc3fe17f682fc40178f415c8b4e5313357f8c0b82a9d6d3b6d4e512b9146eeede1e1dda924fe00358c3bd2dd8b59b8110921c354d2d788cfe1db768ed3f2b83580ad2137a00372b51bbdb91cf87cb1abf72d276772083186077903f03404d32e992d34cd87039eb2fa7ff8d9659b9cbfabc1db3519ef33070f191488bf9556208d6b41f514777fdd0dddc9cae97c9020f856f0b3572d99b44d649481f295b24c074a8", 0xd4}, {&(0x7f0000000d40)="c68c9f7a46b588be40b98bb36c80728d5f57306d313e81df475290497700dba04027feee69d89141c11214cfe8fdce2564c1ca2cb776a279a4793eb5831ef06f514cbe35946bb6783cdfc2d161b0581c098489f5dc7fdab16af3b0981a3c", 0x5e, 0x1ff}], 0x811802, &(0x7f0000000e80)={[{@iocharset={'iocharset', 0x3d, 'iso8859-4'}}, {@shortname_lower='shortname=lower'}, {@iocharset={'iocharset', 0x3d, 'iso8859-14'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x88000, 0x0) accept$unix(r3, &(0x7f0000000680), &(0x7f0000000700)=0x6e) write$binfmt_elf64(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="ec"], 0x1) dup3(r2, r0, 0x0) finit_module(r2, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000480)={[], 0x101, 0x200, 0x6, 0x0, 0x2, 0x10000, 0xf000, [], 0x4}) sendfile(r0, r4, 0x0, 0xdd) vmsplice(r0, &(0x7f0000000400)=[{&(0x7f0000000040)="436c98bef49d7a0f604a8c379979f40f64eb3c9a311994de596c7e5dc89226298f9578c24c3bde78646e419b442018889ba3b669fc19e4fbb8d354a71734026317205efb5395991436fa0f19e8914257833c0038980eb9458d47bd4f8bd21a0c3dc40d9f88b6f89ccec132fdb338294acb7a561651d7751e89e6bffe375839530b308d7e4ad2e7e6e4ef5ee278a7baa1a481c777ada8056ebd2a9c20528044e2cc3320745889", 0xffffffffffffff32}, {&(0x7f0000000100)="a08e7be53a973204213b56c089f68ed667e3f10546ebf0135e6d00b32dd9d11ea09a47dacc7d2e00c631d9d9eaa5de2ee545e692616ab49e2f0efce9d90b8369e879d45a", 0x44}, {&(0x7f0000000180)="cabf5157bae11f9bfa855474e7ac3d856425c4ede992ba86ded506ff367998161dd590fe4901283dcbb43843e56a5c140815f230a795ca0ca8958f356e42372a2d4f6c8ea12e104bb481c735fcbaecadf6b72211504b07cbae7ad547c97a05458263ff9d5bebaeec6bf462612cbb1933282f81ef797e27bb74d3c8104ce46e72ab435c07b26037808ba8a96226a1c46a29210eddf10582bbb3018711676bd1d2098fdb175e30bf464164b27b0b2f44e7f8a1cfc499ce020c1ce79f9fcb", 0xbd}, {&(0x7f0000000240)="9e5e1d9343c27298fb0e2da507b1e7e66f22c844e7ae6b4d137ac1bf58598989fd14057c7aff9789262ed1a53bfd474d872f56265bc54d0704bdaa92f635163096ac97d9d5cd42743340a8b0f7ba880f4e00580c2f1aeec2c3e260745249c826dc8c7b1807fcb7ef2299c2eb04563dc0069d0b5861042d56d2d044d406ca788ce330295822b2d9ac8e338417f9f41649d31cdbce027cd5ced8fe1a998362182b2ed309492943cdca290f5ba0a78e2049b11b22f33ad5fb0e37ee6454922737946c2c13af4150532d348fa9ac0198d5d3f27f75ad735e040d17a3c2e5e483b1bcb2935aaa9ca0afb95b650e8206d46da6fb765a8355df", 0xf6}, {&(0x7f0000000340)="8a2417d62950240bc4d26610c56175e75d1a4abe53ac2dbbabfda6493c5f41592d0ce1de30fbb360c638191c5ccdf434d378f81792ad94b98a93504f62e67c788510494cf69eecce4ea703ce61330a32a0defc133b18e364b720ef63f26d8614c2bc8eea8fed8d308957189626a9c52aa6d466bb3d39dc854a8d2e46e0ced690bce09db782853d873777e54206e35c3c18b6d736707f17bbf22c13322d3642950707de1d4bb2e008247396b021", 0xad}], 0x5, 0x3) socketpair(0x1, 0x80000, 0x4, &(0x7f0000000f00)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, 0xffffffffffffffff, &(0x7f00000007c0)={0x50000000}) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000740)='/dev/btrfs-control\x00', 0x103180, 0x0) ioctl$DRM_IOCTL_GET_CTX(r5, 0xc0086423, &(0x7f0000000780)={0x0, 0x3}) open(0x0, 0x0, 0x0) 05:23:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:07 executing program 5: 05:23:07 executing program 3: 05:23:07 executing program 2: 05:23:07 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 336.431446][ T26] audit: type=1804 audit(1569216187.694:37): pid=20214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir071500306/syzkaller.3RrPEl/122/bus" dev="sda1" ino=17001 res=1 05:23:07 executing program 5: 05:23:07 executing program 2: [ 336.489289][ T26] audit: type=1800 audit(1569216187.694:38): pid=20214 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=17001 res=0 [ 336.542211][T20218] EXT4-fs: 36 callbacks suppressed [ 336.542222][T20218] EXT4-fs (sda1): required extra inode space not available [ 336.556964][T20218] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001000, 05:23:07 executing program 5: 05:23:07 executing program 2: 05:23:07 executing program 3: 05:23:08 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) pipe2$9p(&(0x7f0000000040), 0x4000) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:08 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 336.760873][T20333] EXT4-fs (sda1): required extra inode space not available [ 336.895087][T20333] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001000, 05:23:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:08 executing program 3: 05:23:08 executing program 5: 05:23:08 executing program 2: 05:23:08 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:08 executing program 3: 05:23:08 executing program 2: 05:23:08 executing program 5: 05:23:08 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:08 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000040), 0x2) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:08 executing program 3: [ 337.251400][T20459] EXT4-fs (sda1): required extra inode space not available 05:23:08 executing program 2: [ 337.294045][T20459] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001000, [ 337.307561][T20470] futex_atomic_op_inuser: 2 callbacks suppressed [ 337.307572][T20470] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 337.386744][T20475] EXT4-fs (sda1): required extra inode space not available [ 337.450638][T20475] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001000, 05:23:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:08 executing program 5: 05:23:08 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:08 executing program 3: 05:23:08 executing program 2: 05:23:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x158, r2, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1e}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x3c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9b6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffd533cbff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfe5a}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff01}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x84}, 0x2004804) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x12281, 0x44) 05:23:08 executing program 5: 05:23:08 executing program 3: 05:23:08 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f00000000c0)=""/83, 0x53, 0x0) 05:23:08 executing program 2: [ 337.801543][T20591] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:09 executing program 3: 05:23:09 executing program 5: 05:23:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:09 executing program 2: 05:23:09 executing program 3: 05:23:09 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f00000000c0)=""/83, 0x53, 0x0) 05:23:09 executing program 5: 05:23:09 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000040)) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:09 executing program 2: 05:23:09 executing program 5: [ 338.246615][T20723] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:09 executing program 3: 05:23:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:09 executing program 2: 05:23:09 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f00000000c0)=""/83, 0x53, 0x0) 05:23:09 executing program 5: 05:23:09 executing program 3: 05:23:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$restrict_keyring(0x2, 0x0, 0x0, 0x0) 05:23:09 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0xa1f40003) open(0x0, 0x0, 0x0) 05:23:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:09 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:10 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) creat(&(0x7f0000000080)='./file0\x00', 0x0) 05:23:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:10 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, 0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:10 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, 0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:10 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00'}) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) timer_settime(r0, 0x0, &(0x7f0000000600)={{}, {0x77359400}}, 0x0) timer_gettime(r0, &(0x7f0000000040)) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x10, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 342.159008][T21041] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:13 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:13 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 342.240083][T21048] EXT4-fs (sda1): required extra inode space not available [ 342.314818][T21048] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001000, 05:23:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x48, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:13 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329", 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:13 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x8, 0x4) open(0x0, 0x1, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @local}}, 0x6, 0x8, 0xd4, 0x4, 0x32}, &(0x7f00000001c0)=0x98) [ 342.641012][T21171] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:16 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:16 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:16 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329", 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:16 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:16 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/de\xf6/input,eveft#\x00', 0x8, 0x50e00) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:16 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b653", 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 345.373930][T21284] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:16 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, 0x0) 05:23:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x68, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:16 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b653", 0x7) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:16 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, 0x0) 05:23:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:19 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:19 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:19 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, 0x0) 05:23:19 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, 0x0) 05:23:19 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r7 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r7, r8, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) r9 = socket$netlink(0x10, 0x3, 0x9) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r9, r10, 0x0, 0xdd) r11 = socket$netlink(0x10, 0x3, 0x9) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r11, r12, 0x0, 0xdd) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_i', @ANYRESDEC=r8, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYPTR=&(0x7f00000005c0)=ANY=[]]) r13 = socket$netlink(0x10, 0x3, 0x9) r14 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r13, r14, 0x0, 0xdd) openat$vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vsock\x00', 0x8000, 0x0) r15 = socket$netlink(0x10, 0x3, 0x9) r16 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r15, r16, 0x0, 0xdd) getsockopt$inet_IP_XFRM_POLICY(r16, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)=0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000005c0)={0x218, 0xffffffffffffffda, 0x4, [{{0x3, 0x0, 0x6, 0x7f3, 0x5, 0x0, {0x7, 0x1e, 0x1f, 0x0, 0x80, 0x1, 0x4, 0x10000, 0x1, 0x3ff, 0x2, r3, r4, 0xbe0, 0x8001}}, {0x3, 0x1bc1, 0x9, 0x7, 'nodeveth1'}}, {{0x0, 0x100000001, 0x2, 0x1, 0x0, 0x9, {0x0, 0x7fff, 0x7, 0x6a, 0x1, 0x2, 0x16, 0x660, 0x40, 0x9, 0x9, r5, r8, 0x5, 0x1f}}, {0x5, 0x0, 0x12, 0x400, '/dev/input/event#\x00'}}, {{0x2, 0x0, 0x827, 0x4, 0x7, 0x650e, {0x2, 0x9, 0x1, 0x1, 0x3ff, 0xfffffffff78410af, 0x3, 0x5, 0x80000000, 0x8, 0x1, r17, r18, 0x3, 0x5c4}}, {0x5, 0xdef, 0x12, 0x0, '/dev/input/event#\x00'}}]}, 0x218) open(0x0, 0x0, 0x0) 05:23:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x74, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:19 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, 0x0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922a", 0x1a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 348.630418][T21429] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:19 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:20 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a", 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, 0x0, 0x0, 0x0) 05:23:20 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:20 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x5) ptrace$cont(0x7, r0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x2, r0}) 05:23:20 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a", 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 349.159944][T21552] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:20 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x300, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:20 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:20 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r3 = socket$netlink(0x10, 0x3, 0x9) r4 = dup3(r0, 0xffffffffffffffff, 0x80000) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r5, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10000}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x101}, 0x40) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r7 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f00000002c0)={0x0, 0x6}, &(0x7f0000000300)=0x8) sendfile(r3, r6, 0x0, 0xdd) sendfile(r0, r3, 0x0, 0x0) getsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) r8 = socket$netlink(0x10, 0x3, 0x9) r9 = socket$netlink(0x10, 0x3, 0x9) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r9, r10, 0x0, 0xdd) ioctl$VHOST_VSOCK_SET_RUNNING(r10, 0x4004af61, &(0x7f0000000380)) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000240)=0x1) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r8, r11, 0x0, 0xdd) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r11) open(0x0, 0x0, 0x0) 05:23:20 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3f", 0x15) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 349.602027][T21661] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x500, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:20 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:21 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a", 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:21 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:21 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3f", 0x15) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x600, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 349.997156][T21782] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:21 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:23 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:23 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x700, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:23 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:23 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3f", 0x15) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:23 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071", 0xe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 352.754240][T21906] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x900, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:24 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071", 0xe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:24 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:24 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x3bbfcc36f6b708c) clone(0x41841900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) open(0x0, 0x0, 0x0) 05:23:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa00, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 353.146089][T22020] IPVS: ftp: loaded support on port[0] = 21 05:23:24 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:27 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf36, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:27 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:27 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:27 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:27 executing program 4: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x3f, 0x40) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) accept4$netrom(r1, &(0x7f00000000c0)={{}, [@remote, @netrom, @bcast, @netrom, @rose, @null, @null, @default]}, &(0x7f0000000000)=0x48, 0x8a724e9cf5943532) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x1c0, 0x4b) [ 355.885705][T22148] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:27 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:27 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:27 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:27 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') [ 356.385024][T22269] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:30 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:30 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:30 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x360f, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) write$P9_RSYMLINK(r1, &(0x7f0000000040)={0x14, 0x11, 0x2, {0x94, 0x3, 0x3}}, 0x14) socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) sendfile(r5, r2, 0x0, 0x0) bind$isdn(r2, &(0x7f00000000c0)={0x22, 0x4, 0x7f, 0x5, 0x1ff}, 0x6) r6 = socket$netlink(0x10, 0x3, 0x9) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000180)) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) setsockopt$packet_int(r7, 0x107, 0xb, &(0x7f0000000140)=0x1, 0x4) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000080)={0x6, 0x400}) open(0x0, 0x0, 0x0) 05:23:30 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 358.955608][T22383] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:30 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open$dir(&(0x7f0000000040)='\x00', 0x183200, 0x80) open(0x0, 0x0, 0x0) 05:23:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 359.565872][T22495] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4800, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:31 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:31 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:31 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:31 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:31 executing program 4: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x10000, 0x581102) geteuid() clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000100)=0x2) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r2, 0x7e20, 0x6}, 0x8) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f00000000c0)={0x0, 0x4, 0x80, [], &(0x7f0000000080)=0x7f}) open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) setuid(r5) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) bind$can_raw(r7, &(0x7f0000000240), 0x10) 05:23:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 360.173801][T22617] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:31 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6800, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:31 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1000, 0x0) ioctl$SIOCX25GFACILITIES(r0, 0x89e2, &(0x7f0000000080)) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 360.601500][T22732] QAT: Invalid ioctl [ 360.616399][T22732] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 360.692479][T22732] QAT: Invalid ioctl 05:23:32 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x0, 0x1, 0x71e8, 0x81, 0x3a9, 0x661e4a7}) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x202040) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7400, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:32 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:32 executing program 3: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 361.074235][T22845] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:34 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x500, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:34 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:34 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) personality(0x200000) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) read$FUSE(r1, &(0x7f0000000040), 0x1000) open(0x0, 0x0, 0x0) 05:23:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xff00, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 363.099484][T22962] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 363.167896][T22959] EXT4-fs (sda1): required extra inode space not available [ 363.215427][T22959] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001000, 05:23:34 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x101000, 0x0) 05:23:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x200000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:34 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 363.617012][T23079] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x400000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:35 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:35 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:37 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) sendmsg$kcm(r1, &(0x7f0000000880)={&(0x7f0000000040)=@llc={0x1a, 0x204, 0x1, 0x2, 0x3, 0x6, @link_local}, 0x80, &(0x7f0000000800)=[{&(0x7f00000000c0)}, {&(0x7f00000004c0)="5dae76d768de2408033ac9027cb79de20cd09d295e7c85cb5fd86ebec53427d13e286ec6da56e862ee24b1fbf45ddb24b038eec3d3b6c80cc5d73f69065beaae64f2eda81aabca44745e2ec5cbe8fd245b86276ad5d38ea269f2f9a8b059", 0x5e}, {&(0x7f0000000540)="3a15427ecc2eb499626008cf19614a3ba4e0d08b441deb2006763a1521a3210a261ba1ad7c48bb19e8316acc8796d0b312be1abb4c531ea5b8322fa4eec050a6281d37a1b1358e8e1741106873bbbd464c7db116e7cf636026aac74bf73ba252d2cf0db4a233eb5acb3a7007c89af7d57545815a7ec525f4e4669612e71f56b86072903e928e1b8cade5723ddab4156bab08a80f2a9bc4a806841094f88dcc560e596cd473893932323a642a554d3c57a76d7f15b6ec40ddf8c37e83d5", 0xbd}, {&(0x7f0000000600)='\tV', 0x2}, {&(0x7f0000000640)="1f0607e67f44a778f8ec15cd4357a4323148dac5524f3c2b3b6251b9cf2d89cdeac167b18a38d40b0e356e39f0a8d1d9a90f18ccbd642bdaaa0517b7a604f7ee8163327d45ea0fd652609d445bec90bf5e52c648a5965feb0d9a8a236233239d252f541741eee2380179f101245d0d09ff9c17587cb51dbcf7e43ca4855b4176efe2cf71eb497799d2d50758ec169b940567899dc5122615791dc61bcc", 0x9d}, {&(0x7f0000000700)="9ec0e63f4fb65e0f150080c468c466effb1ac55b1310cefb1be5e487bb1bca032849114b0c552af681507494ec16b3dccdca12528d7491af0cbba5c4b37961a939a2d9bac9bbc187e30124ae24f8c26d88b309c86285dc6ba5dca9a44efcc375106eeb0ba6310fd2996a03295da23c5c876b78670e3c15729e3e9615eb6dafc13a23ce08859f8df1861c36e1991940e80347a81d5f8ba51f6a6ce4e4115987f6e1ac49e1cf3a1cc8bdb6d5b4e104807cbae13ba03c0a1e36a891890c0b354379214c76774399f43a10bdd279e636e9eca9ea", 0xd2}], 0x6}, 0x8000) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) r3 = dup(r2) recvmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/49, 0x31}, {&(0x7f0000000140)=""/232, 0xe8}, {&(0x7f0000000240)=""/204, 0xcc}, {&(0x7f0000000340)=""/47, 0x2f}, {&(0x7f0000000380)=""/20, 0x14}], 0x5, &(0x7f0000000440)=""/54, 0x36}, 0x20) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) io_setup(0x1, &(0x7f00000000c0)=0x0) io_pgetevents(r4, 0xfffffffffffff256, 0x3, &(0x7f00000008c0)=[{}, {}, {}], &(0x7f0000000940)={0x0, 0x1c9c380}, &(0x7f00000009c0)={&(0x7f0000000980)={0x10001}, 0x8}) 05:23:37 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:37 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:37 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:37 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 366.190013][T23203] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1a8a002, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:37 executing program 2: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x5, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:37 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922a", 0x1a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:37 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x2000) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000080)=""/231) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r2, 0x0, 0xdd) ioctl$TIOCEXCL(r2, 0x540c) open(0x0, 0x100, 0x1) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f00000001c0)={0x4, &(0x7f0000000180)=[{0x6, 0x7, 0x31, 0x77d}, {0x3, 0x3f, 0x8, 0x3}, {0x10001, 0x4, 0x8, 0xffffffff}, {0xfff, 0x1, 0x3, 0x2}]}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) open_by_handle_at(r3, &(0x7f0000000200)={0xeb, 0x1000, "490eeca62e0323d5e2614cc5b7e02c426e3c0882ee97984775f308c2b98b8bafe066f79466ddeead699cb03f47adf9c3cd6a5a5271f3fcf447c021b5bb3e693fb6f9b79269e8c0aed790fb2288685b5aeecc74ee2509410aaa2910664b00fc23bcec29c094f46aff2f0f769069eebf25a236c69c68cf50ba8272ee7779d8751256b5bc88d9ce45855e7eff66573254c79bfaf58540ba46d8e753e2526048f6f328bc7940d8dc9b8ba8f9124abab7fcf0f84750497643895ba90ca72086356a5432b559863bb69f9caec64556a8c12e08cde42e1ae283f08d7b401279d1ff8fe32b1c10"}, 0x2100) [ 366.455534][T23321] futex_wake_op: syz-executor.2 tries to shift op by -192; fix this program 05:23:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 366.558576][T23328] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:40 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:40 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a", 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:40 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2a0a801, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:40 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xd) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x9, 0x3}, {0x0, 0x4}], r0}, 0x18, 0x3) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) [ 369.258663][T23445] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:40 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:40 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:40 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 369.758615][T23561] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:41 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3f", 0x15) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:43 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:43 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = open(0x0, 0x0, 0x0) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000040)={0x7}) 05:23:43 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3f", 0x15) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:43 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3f", 0x15) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:43 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 372.423800][T23690] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:43 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:43 executing program 3 (fault-call:5 fault-nth:0): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:44 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0x1) open(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000040)={0x9, 0x0, 0x6, 0x200, 0x80, 0x401, 0x4}) 05:23:44 executing program 2 (fault-call:6 fault-nth:0): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 372.920585][T23801] FAULT_INJECTION: forcing a failure. [ 372.920585][T23801] name failslab, interval 1, probability 0, space 0, times 0 [ 372.989392][T23801] CPU: 0 PID: 23801 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 372.998214][T23801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.008388][T23801] Call Trace: [ 373.011708][T23801] dump_stack+0x172/0x1f0 [ 373.016062][T23801] should_fail.cold+0xa/0x15 [ 373.021564][T23801] ? fault_create_debugfs_attr+0x180/0x180 [ 373.027450][T23801] __should_failslab+0x121/0x190 [ 373.032414][T23801] should_failslab+0x9/0x14 [ 373.036951][T23801] __kmalloc_track_caller+0x2dc/0x760 [ 373.042364][T23801] ? down_read+0x109/0x430 [ 373.046805][T23801] ? key_default_cmp+0x90/0x90 [ 373.051577][T23801] ? down_read_killable+0x490/0x490 [ 373.056784][T23801] ? dh_data_from_key+0x18c/0x2b0 [ 373.061828][T23801] kmemdup+0x27/0x60 [ 373.065737][T23801] dh_data_from_key+0x18c/0x2b0 [ 373.070609][T23801] __keyctl_dh_compute+0x484/0x13b0 [ 373.075854][T23801] ? refcount_sub_and_test_checked+0x104/0x200 [ 373.082034][T23801] ? dh_data_from_key+0x2b0/0x2b0 [ 373.087176][T23801] ? find_held_lock+0x35/0x130 [ 373.091953][T23801] ? __f_unlock_pos+0x19/0x20 [ 373.096876][T23801] ? __kasan_check_write+0x14/0x20 [ 373.102261][T23801] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 373.108932][T23801] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 373.114226][T23801] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 373.119964][T23801] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 373.125781][T23801] ? lockdep_hardirqs_on+0x421/0x5e0 [ 373.131143][T23801] ? retint_kernel+0x2b/0x2b [ 373.135764][T23801] keyctl_dh_compute+0xcf/0x12d [ 373.140619][T23801] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 373.146116][T23801] ? __this_cpu_preempt_check+0x3a/0x210 [ 373.152658][T23801] ? retint_kernel+0x2b/0x2b [ 373.157546][T23801] __x64_sys_keyctl+0x159/0x490 [ 373.158913][T23812] FAULT_INJECTION: forcing a failure. [ 373.158913][T23812] name failslab, interval 1, probability 0, space 0, times 0 [ 373.162420][T23801] do_syscall_64+0xfa/0x760 [ 373.162443][T23801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.162454][T23801] RIP: 0033:0x459a09 [ 373.162468][T23801] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.162476][T23801] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 373.162491][T23801] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 373.162500][T23801] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 373.162507][T23801] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 373.162514][T23801] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 373.162522][T23801] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 [ 373.230649][T23812] CPU: 1 PID: 23812 Comm: syz-executor.2 Not tainted 5.3.0-next-20190920 #0 [ 373.251857][T23812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.251864][T23812] Call Trace: [ 373.251889][T23812] dump_stack+0x172/0x1f0 [ 373.251910][T23812] should_fail.cold+0xa/0x15 [ 373.251930][T23812] ? fault_create_debugfs_attr+0x180/0x180 [ 373.268668][T23812] ? ___might_sleep+0x163/0x2c0 [ 373.268692][T23812] __should_failslab+0x121/0x190 [ 373.268708][T23812] should_failslab+0x9/0x14 [ 373.268732][T23812] __kmalloc_track_caller+0x2dc/0x760 [ 373.282385][T23812] ? down_read+0x109/0x430 [ 373.282406][T23812] ? key_default_cmp+0x90/0x90 [ 373.282419][T23812] ? down_read_killable+0x490/0x490 [ 373.282440][T23812] ? dh_data_from_key+0x18c/0x2b0 [ 373.336597][T23812] kmemdup+0x27/0x60 [ 373.340622][T23812] dh_data_from_key+0x18c/0x2b0 [ 373.345719][T23812] __keyctl_dh_compute+0x484/0x13b0 [ 373.350941][T23812] ? get_pid_task+0xc9/0x190 [ 373.355529][T23812] ? find_held_lock+0x35/0x130 [ 373.360287][T23812] ? get_pid_task+0xc9/0x190 [ 373.364871][T23812] ? dh_data_from_key+0x2b0/0x2b0 [ 373.370233][T23812] ? find_held_lock+0x35/0x130 [ 373.375103][T23812] ? __f_unlock_pos+0x19/0x20 [ 373.380148][T23812] ? __kasan_check_write+0x14/0x20 [ 373.385273][T23812] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 373.390825][T23812] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 373.396103][T23812] ? wait_for_completion+0x440/0x440 [ 373.401389][T23812] keyctl_dh_compute+0xcf/0x12d [ 373.406233][T23812] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 373.411693][T23812] ? fput+0x1b/0x20 [ 373.415492][T23812] ? ksys_write+0x1cf/0x290 [ 373.419997][T23812] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 373.425451][T23812] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 373.430898][T23812] ? do_syscall_64+0x26/0x760 [ 373.435597][T23812] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.441678][T23812] ? do_syscall_64+0x26/0x760 [ 373.446379][T23812] __x64_sys_keyctl+0x159/0x490 [ 373.451288][T23812] do_syscall_64+0xfa/0x760 [ 373.455791][T23812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.461681][T23812] RIP: 0033:0x459a09 [ 373.465646][T23812] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 373.485253][T23812] RSP: 002b:00007fba4c05ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 373.493676][T23812] RAX: ffffffffffffffda RBX: 00007fba4c05ec90 RCX: 0000000000459a09 [ 373.501669][T23812] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 373.509642][T23812] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 373.517616][T23812] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fba4c05f6d4 [ 373.525700][T23812] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:23:46 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x9000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:46 executing program 3 (fault-call:5 fault-nth:1): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:46 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000080)={0x1, 0x2000, 0x6, 0xfffffffffffffffe, 0x7}) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:46 executing program 2 (fault-call:6 fault-nth:1): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:46 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 375.452926][T23925] FAULT_INJECTION: forcing a failure. [ 375.452926][T23925] name failslab, interval 1, probability 0, space 0, times 0 [ 375.480344][T23930] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 375.501023][T23925] CPU: 1 PID: 23925 Comm: syz-executor.2 Not tainted 5.3.0-next-20190920 #0 [ 375.506758][T23929] FAULT_INJECTION: forcing a failure. [ 375.506758][T23929] name failslab, interval 1, probability 0, space 0, times 0 [ 375.509759][T23925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.509766][T23925] Call Trace: [ 375.509792][T23925] dump_stack+0x172/0x1f0 [ 375.509818][T23925] should_fail.cold+0xa/0x15 [ 375.509840][T23925] ? fault_create_debugfs_attr+0x180/0x180 [ 375.509864][T23925] ? ___might_sleep+0x163/0x2c0 [ 375.509889][T23925] __should_failslab+0x121/0x190 [ 375.509910][T23925] should_failslab+0x9/0x14 [ 375.509929][T23925] __kmalloc_track_caller+0x2dc/0x760 [ 375.509949][T23925] ? down_read+0x109/0x430 [ 375.575963][T23925] ? key_default_cmp+0x90/0x90 [ 375.580741][T23925] ? down_read_killable+0x490/0x490 [ 375.585944][T23925] ? dh_data_from_key+0x18c/0x2b0 [ 375.590987][T23925] kmemdup+0x27/0x60 [ 375.594891][T23925] dh_data_from_key+0x18c/0x2b0 [ 375.599748][T23925] __keyctl_dh_compute+0x4c4/0x13b0 [ 375.604953][T23925] ? get_pid_task+0xc9/0x190 [ 375.609558][T23925] ? find_held_lock+0x35/0x130 [ 375.614326][T23925] ? get_pid_task+0xc9/0x190 [ 375.619047][T23925] ? dh_data_from_key+0x2b0/0x2b0 [ 375.624075][T23925] ? find_held_lock+0x35/0x130 [ 375.628839][T23925] ? __f_unlock_pos+0x19/0x20 [ 375.633547][T23925] ? __kasan_check_write+0x14/0x20 [ 375.638663][T23925] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 375.644211][T23925] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 375.649499][T23925] ? wait_for_completion+0x440/0x440 [ 375.654795][T23925] keyctl_dh_compute+0xcf/0x12d [ 375.659653][T23925] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 375.665134][T23925] ? fput+0x1b/0x20 [ 375.668944][T23925] ? ksys_write+0x1cf/0x290 [ 375.673474][T23925] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 375.678933][T23925] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 375.684400][T23925] ? do_syscall_64+0x26/0x760 [ 375.689079][T23925] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.695145][T23925] ? do_syscall_64+0x26/0x760 [ 375.699829][T23925] __x64_sys_keyctl+0x159/0x490 [ 375.704686][T23925] do_syscall_64+0xfa/0x760 [ 375.709198][T23925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.715112][T23925] RIP: 0033:0x459a09 [ 375.719008][T23925] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 375.738702][T23925] RSP: 002b:00007fba4c05ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 375.747131][T23925] RAX: ffffffffffffffda RBX: 00007fba4c05ec90 RCX: 0000000000459a09 [ 375.755100][T23925] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 375.763068][T23925] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 375.771034][T23925] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fba4c05f6d4 [ 375.779000][T23925] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 [ 375.787034][T23929] CPU: 0 PID: 23929 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 375.795739][T23929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.805807][T23929] Call Trace: [ 375.809110][T23929] dump_stack+0x172/0x1f0 [ 375.813461][T23929] should_fail.cold+0xa/0x15 [ 375.818067][T23929] ? fault_create_debugfs_attr+0x180/0x180 [ 375.823885][T23929] ? ___might_sleep+0x163/0x2c0 [ 375.828757][T23929] __should_failslab+0x121/0x190 [ 375.833705][T23929] should_failslab+0x9/0x14 [ 375.838221][T23929] __kmalloc_track_caller+0x2dc/0x760 [ 375.843602][T23929] ? down_read+0x109/0x430 [ 375.848113][T23929] ? key_default_cmp+0x90/0x90 05:23:47 executing program 2 (fault-call:6 fault-nth:2): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 375.848523][T23937] FAULT_INJECTION: forcing a failure. [ 375.848523][T23937] name failslab, interval 1, probability 0, space 0, times 0 [ 375.852886][T23929] ? down_read_killable+0x490/0x490 [ 375.852902][T23929] ? dh_data_from_key+0x18c/0x2b0 [ 375.852922][T23929] kmemdup+0x27/0x60 [ 375.852939][T23929] dh_data_from_key+0x18c/0x2b0 [ 375.852957][T23929] __keyctl_dh_compute+0x4c4/0x13b0 [ 375.852972][T23929] ? lockdep_hardirqs_on+0x421/0x5e0 [ 375.852986][T23929] ? retint_kernel+0x2b/0x2b [ 375.852999][T23929] ? trace_hardirqs_on_caller+0x6a/0x240 [ 375.853011][T23929] ? find_held_lock+0x35/0x130 [ 375.853031][T23929] ? dh_data_from_key+0x2b0/0x2b0 [ 375.914933][T23929] ? find_held_lock+0x35/0x130 [ 375.919698][T23929] ? __f_unlock_pos+0x19/0x20 [ 375.924403][T23929] ? __kasan_check_write+0x14/0x20 [ 375.929518][T23929] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 375.935064][T23929] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 375.940343][T23929] ? wait_for_completion+0x440/0x440 [ 375.945635][T23929] keyctl_dh_compute+0xcf/0x12d [ 375.950491][T23929] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 375.956095][T23929] ? fput+0x1b/0x20 [ 375.959903][T23929] ? ksys_write+0x1cf/0x290 [ 375.964414][T23929] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 375.970135][T23929] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 375.975624][T23929] ? do_syscall_64+0x26/0x760 [ 375.980300][T23929] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.986362][T23929] ? do_syscall_64+0x26/0x760 [ 375.991062][T23929] __x64_sys_keyctl+0x159/0x490 [ 375.995924][T23929] do_syscall_64+0xfa/0x760 [ 376.000703][T23929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.008621][T23929] RIP: 0033:0x459a09 [ 376.015133][T23929] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.034742][T23929] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 376.043152][T23929] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 376.051635][T23929] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 376.059598][T23929] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 376.067561][T23929] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 376.075528][T23929] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 [ 376.083519][T23937] CPU: 1 PID: 23937 Comm: syz-executor.2 Not tainted 5.3.0-next-20190920 #0 [ 376.092202][T23937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.102346][T23937] Call Trace: [ 376.105646][T23937] dump_stack+0x172/0x1f0 [ 376.109987][T23937] should_fail.cold+0xa/0x15 [ 376.114626][T23937] ? fault_create_debugfs_attr+0x180/0x180 [ 376.120567][T23937] ? ___might_sleep+0x163/0x2c0 [ 376.125430][T23937] __should_failslab+0x121/0x190 [ 376.130375][T23937] should_failslab+0x9/0x14 [ 376.134899][T23937] __kmalloc_track_caller+0x2dc/0x760 [ 376.140280][T23937] ? down_read+0x109/0x430 [ 376.144702][T23937] ? key_default_cmp+0x90/0x90 [ 376.149521][T23937] ? down_read_killable+0x490/0x490 [ 376.154760][T23937] ? dh_data_from_key+0x18c/0x2b0 [ 376.159799][T23937] kmemdup+0x27/0x60 [ 376.163714][T23937] dh_data_from_key+0x18c/0x2b0 [ 376.168592][T23937] __keyctl_dh_compute+0x4f5/0x13b0 [ 376.173805][T23937] ? get_pid_task+0xc9/0x190 [ 376.178593][T23937] ? find_held_lock+0x35/0x130 [ 376.182402][T23940] FAULT_INJECTION: forcing a failure. [ 376.182402][T23940] name failslab, interval 1, probability 0, space 0, times 0 [ 376.183356][T23937] ? get_pid_task+0xc9/0x190 [ 376.183378][T23937] ? dh_data_from_key+0x2b0/0x2b0 [ 376.183393][T23937] ? find_held_lock+0x35/0x130 [ 376.183409][T23937] ? __f_unlock_pos+0x19/0x20 [ 376.183443][T23937] ? __kasan_check_write+0x14/0x20 [ 376.183464][T23937] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 376.225709][T23937] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 376.231098][T23937] ? wait_for_completion+0x440/0x440 [ 376.236407][T23937] keyctl_dh_compute+0xcf/0x12d [ 376.241299][T23937] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 376.246794][T23937] ? fput+0x1b/0x20 [ 376.250608][T23937] ? ksys_write+0x1cf/0x290 [ 376.255125][T23937] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 376.260588][T23937] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 376.266055][T23937] ? do_syscall_64+0x26/0x760 [ 376.270742][T23937] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.276813][T23937] ? do_syscall_64+0x26/0x760 [ 376.281502][T23937] __x64_sys_keyctl+0x159/0x490 [ 376.286623][T23937] do_syscall_64+0xfa/0x760 [ 376.291137][T23937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.297039][T23937] RIP: 0033:0x459a09 [ 376.300937][T23937] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.320895][T23937] RSP: 002b:00007fba4c05ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 376.329312][T23937] RAX: ffffffffffffffda RBX: 00007fba4c05ec90 RCX: 0000000000459a09 [ 376.337286][T23937] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 376.345262][T23937] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 05:23:47 executing program 3 (fault-call:5 fault-nth:2): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:47 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:47 executing program 5: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:47 executing program 5: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 376.353234][T23937] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fba4c05f6d4 [ 376.361211][T23937] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 [ 376.404220][T23940] CPU: 0 PID: 23940 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 376.413024][T23940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.423088][T23940] Call Trace: [ 376.426392][T23940] dump_stack+0x172/0x1f0 [ 376.430742][T23940] should_fail.cold+0xa/0x15 [ 376.435343][T23940] ? fault_create_debugfs_attr+0x180/0x180 [ 376.441286][T23940] ? ___might_sleep+0x163/0x2c0 [ 376.446155][T23940] __should_failslab+0x121/0x190 [ 376.451103][T23940] should_failslab+0x9/0x14 [ 376.457049][T23940] __kmalloc_track_caller+0x2dc/0x760 [ 376.462512][T23940] ? down_read+0x109/0x430 [ 376.467013][T23940] ? key_default_cmp+0x90/0x90 [ 376.471781][T23940] ? down_read_killable+0x490/0x490 [ 376.476984][T23940] ? dh_data_from_key+0x18c/0x2b0 [ 376.482019][T23940] kmemdup+0x27/0x60 [ 376.486132][T23940] dh_data_from_key+0x18c/0x2b0 [ 376.491012][T23940] __keyctl_dh_compute+0x4f5/0x13b0 [ 376.496251][T23940] ? get_pid_task+0xc9/0x190 [ 376.500862][T23940] ? find_held_lock+0x35/0x130 [ 376.505631][T23940] ? get_pid_task+0xc9/0x190 [ 376.510241][T23940] ? dh_data_from_key+0x2b0/0x2b0 [ 376.515536][T23940] ? find_held_lock+0x35/0x130 [ 376.520314][T23940] ? __f_unlock_pos+0x19/0x20 [ 376.525020][T23940] ? __kasan_check_write+0x14/0x20 [ 376.530146][T23940] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 376.536417][T23940] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 376.541731][T23940] ? wait_for_completion+0x440/0x440 [ 376.547034][T23940] keyctl_dh_compute+0xcf/0x12d [ 376.551896][T23940] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 376.557359][T23940] ? fput+0x1b/0x20 [ 376.561175][T23940] ? ksys_write+0x1cf/0x290 [ 376.565717][T23940] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 376.571188][T23940] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 376.576650][T23940] ? do_syscall_64+0x26/0x760 [ 376.581322][T23940] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.581336][T23940] ? do_syscall_64+0x26/0x760 [ 376.581355][T23940] __x64_sys_keyctl+0x159/0x490 [ 376.581372][T23940] do_syscall_64+0xfa/0x760 [ 376.581389][T23940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.581401][T23940] RIP: 0033:0x459a09 [ 376.581417][T23940] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.581425][T23940] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 376.581439][T23940] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 05:23:47 executing program 2 (fault-call:6 fault-nth:3): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x10000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:47 executing program 3 (fault-call:5 fault-nth:3): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 376.581448][T23940] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 376.581456][T23940] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 376.581464][T23940] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 376.581472][T23940] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 [ 376.715487][T23954] FAULT_INJECTION: forcing a failure. [ 376.715487][T23954] name failslab, interval 1, probability 0, space 0, times 0 [ 376.731767][T23954] CPU: 1 PID: 23954 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 376.740469][T23954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.740585][T23955] FAULT_INJECTION: forcing a failure. [ 376.740585][T23955] name failslab, interval 1, probability 0, space 0, times 0 [ 376.750543][T23954] Call Trace: [ 376.750569][T23954] dump_stack+0x172/0x1f0 [ 376.750593][T23954] should_fail.cold+0xa/0x15 [ 376.750613][T23954] ? fault_create_debugfs_attr+0x180/0x180 [ 376.750636][T23954] ? should_fail+0x29/0x852 [ 376.750660][T23954] __should_failslab+0x121/0x190 [ 376.750679][T23954] should_failslab+0x9/0x14 [ 376.750706][T23954] __kmalloc+0x2e0/0x770 [ 376.799523][T23954] ? refcount_dec_and_test_checked+0x1b/0x20 [ 376.805532][T23954] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 376.811780][T23954] ? key_put+0x36/0x90 [ 376.815859][T23954] ? dh_data_from_key+0x9d/0x2b0 [ 376.820798][T23954] ? __keyctl_dh_compute+0x52f/0x13b0 [ 376.826277][T23954] __keyctl_dh_compute+0x52f/0x13b0 [ 376.831489][T23954] ? mark_held_locks+0xa4/0xf0 [ 376.836258][T23954] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 376.841717][T23954] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 376.847184][T23954] ? dh_data_from_key+0x2b0/0x2b0 [ 376.852303][T23954] ? find_held_lock+0x35/0x130 [ 376.857066][T23954] ? __f_unlock_pos+0x19/0x20 [ 376.861757][T23954] ? __f_unlock_pos+0x19/0x20 [ 376.866442][T23954] ? __kasan_check_write+0x14/0x20 [ 376.871574][T23954] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 376.877658][T23954] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 376.882956][T23954] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 376.888419][T23954] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 376.893889][T23954] ? lockdep_hardirqs_on+0x421/0x5e0 [ 376.899209][T23954] ? retint_kernel+0x2b/0x2b [ 376.903816][T23954] keyctl_dh_compute+0xcf/0x12d [ 376.908675][T23954] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 376.914162][T23954] ? __this_cpu_preempt_check+0x3a/0x210 [ 376.920324][T23954] ? retint_kernel+0x2b/0x2b [ 376.924931][T23954] __x64_sys_keyctl+0x159/0x490 [ 376.929814][T23954] do_syscall_64+0xfa/0x760 [ 376.934346][T23954] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.940240][T23954] RIP: 0033:0x459a09 [ 376.944142][T23954] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 376.963843][T23954] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 376.972262][T23954] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 376.980242][T23954] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 376.988228][T23954] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 376.996294][T23954] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 377.004271][T23954] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 [ 377.016304][T23955] CPU: 0 PID: 23955 Comm: syz-executor.2 Not tainted 5.3.0-next-20190920 #0 [ 377.025002][T23955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.035062][T23955] Call Trace: [ 377.038372][T23955] dump_stack+0x172/0x1f0 [ 377.042717][T23955] should_fail.cold+0xa/0x15 [ 377.042736][T23955] ? fault_create_debugfs_attr+0x180/0x180 [ 377.053114][T23955] ? ___might_sleep+0x163/0x2c0 [ 377.053134][T23955] __should_failslab+0x121/0x190 [ 377.053150][T23955] should_failslab+0x9/0x14 [ 377.053166][T23955] __kmalloc+0x2e0/0x770 [ 377.053181][T23955] ? refcount_dec_and_test_checked+0x1b/0x20 [ 377.053197][T23955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 377.053213][T23955] ? key_put+0x36/0x90 [ 377.053228][T23955] ? dh_data_from_key+0x9d/0x2b0 [ 377.053238][T23955] ? __keyctl_dh_compute+0x52f/0x13b0 [ 377.053261][T23955] __keyctl_dh_compute+0x52f/0x13b0 [ 377.063055][T23955] ? mark_held_locks+0xa4/0xf0 [ 377.063076][T23955] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 377.071780][T23955] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 377.071794][T23955] ? lockdep_hardirqs_on+0x421/0x5e0 [ 377.071811][T23955] ? retint_kernel+0x2b/0x2b [ 377.071829][T23955] ? dh_data_from_key+0x2b0/0x2b0 [ 377.071841][T23955] ? find_held_lock+0x35/0x130 [ 377.071855][T23955] ? __f_unlock_pos+0x19/0x20 [ 377.071890][T23955] ? __kasan_check_write+0x14/0x20 [ 377.084154][T23955] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 377.084177][T23955] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 377.093146][T23955] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 377.093160][T23955] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 377.093176][T23955] ? lockdep_hardirqs_on+0x421/0x5e0 [ 377.093193][T23955] ? retint_kernel+0x2b/0x2b [ 377.093207][T23955] ? trace_hardirqs_on_caller+0x6a/0x240 [ 377.093227][T23955] keyctl_dh_compute+0xcf/0x12d [ 377.093240][T23955] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 377.093265][T23955] ? __this_cpu_preempt_check+0x3a/0x210 [ 377.202771][T23955] ? retint_kernel+0x2b/0x2b [ 377.207379][T23955] __x64_sys_keyctl+0x159/0x490 [ 377.212247][T23955] do_syscall_64+0xfa/0x760 [ 377.217039][T23955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.222940][T23955] RIP: 0033:0x459a09 [ 377.226851][T23955] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.246497][T23955] RSP: 002b:00007fba4c05ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 377.254896][T23955] RAX: ffffffffffffffda RBX: 00007fba4c05ec90 RCX: 0000000000459a09 [ 377.263112][T23955] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 377.271067][T23955] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 377.279032][T23955] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fba4c05f6d4 [ 377.286986][T23955] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:23:48 executing program 3 (fault-call:5 fault-nth:4): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:48 executing program 5: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 377.474238][T24069] FAULT_INJECTION: forcing a failure. [ 377.474238][T24069] name failslab, interval 1, probability 0, space 0, times 0 [ 377.495636][T24069] CPU: 1 PID: 24069 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 377.504364][T24069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.514552][T24069] Call Trace: [ 377.517838][T24069] dump_stack+0x172/0x1f0 [ 377.523467][T24069] should_fail.cold+0xa/0x15 [ 377.528187][T24069] ? fault_create_debugfs_attr+0x180/0x180 [ 377.534073][T24069] ? ___might_sleep+0x163/0x2c0 [ 377.538922][T24069] __should_failslab+0x121/0x190 [ 377.543853][T24069] should_failslab+0x9/0x14 [ 377.548361][T24069] __kmalloc+0x2e0/0x770 [ 377.552619][T24069] ? __crypto_alg_lookup+0x2fa/0x370 [ 377.557897][T24069] ? crypto_create_tfm+0x82/0x300 [ 377.562914][T24069] crypto_create_tfm+0x82/0x300 [ 377.567759][T24069] ? crypto_alg_mod_lookup+0xff/0x550 [ 377.573386][T24069] crypto_alloc_tfm+0x105/0x2e0 [ 377.578242][T24069] ? memcpy+0x46/0x50 [ 377.582224][T24069] crypto_alloc_kpp+0x2d/0x40 [ 377.586924][T24069] __keyctl_dh_compute+0x580/0x13b0 [ 377.592123][T24069] ? retint_kernel+0x2b/0x2b [ 377.596721][T24069] ? trace_hardirqs_on_caller+0x6a/0x240 [ 377.602380][T24069] ? dh_data_from_key+0x2b0/0x2b0 [ 377.607397][T24069] ? find_held_lock+0x35/0x130 [ 377.612240][T24069] ? __f_unlock_pos+0x19/0x20 [ 377.616912][T24069] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 377.622537][T24069] ? retint_kernel+0x2b/0x2b [ 377.627126][T24069] ? trace_hardirqs_on_caller+0x6a/0x240 [ 377.632790][T24069] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 377.638235][T24069] ? __this_cpu_preempt_check+0x3a/0x210 [ 377.643855][T24069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 377.650079][T24069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 377.656391][T24069] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 377.661848][T24069] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 377.667310][T24069] ? lockdep_hardirqs_on+0x421/0x5e0 [ 377.672585][T24069] ? retint_kernel+0x2b/0x2b [ 377.677181][T24069] keyctl_dh_compute+0xcf/0x12d [ 377.682032][T24069] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 377.687647][T24069] ? __this_cpu_preempt_check+0x3a/0x210 [ 377.693279][T24069] ? retint_kernel+0x2b/0x2b [ 377.697865][T24069] __x64_sys_keyctl+0x159/0x490 [ 377.702702][T24069] do_syscall_64+0xfa/0x760 [ 377.707193][T24069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.713216][T24069] RIP: 0033:0x459a09 [ 377.717098][T24069] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 377.736874][T24069] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 377.745289][T24069] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 377.753354][T24069] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 377.761600][T24069] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 377.769568][T24069] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 377.777530][T24069] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:23:49 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:49 executing program 2 (fault-call:6 fault-nth:4): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:49 executing program 4: syz_open_dev$evdev(&(0x7f0000000080)='t\x01\xe5C\xe2\xf4t#\x00\x00\xee\xd0.\xa8e\xe2\xd6\xb7', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) pwritev(r3, &(0x7f0000002a40)=[{&(0x7f0000000000)="0aa0c037e9738a3efcbe5efce8c4ebead7520453fa418bad5ba3dc067a265c5396963fa4abdd7fda6e1c2081333e09", 0x2f}, {&(0x7f0000003000)="fbfdadf8eab823611c356e15880b6be749759004acb88dc43842f7488fc8bc8deeaf9b8839e8f8aa56095a5e12856183d34688173f89a4645d635ed14196d31a33092c04cea50751b560d0afa962cbdbfdf1f155f03c76d11593d5708c6e030abfd60611c0f310570d295c2e0949f62824ca0e9c406f1840ddd85d062a1cdb58615cacdcc4d45e129a8ee7262367fb1fa0029f158b67ce5c56b8", 0x9a}], 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002e00)=[{{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f00000000c0)=""/199, 0xc7}, 0xd10}, {{&(0x7f00000001c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000240)=""/121, 0x79}, {&(0x7f00000002c0)=""/176, 0xb0}, {&(0x7f0000000380)=""/227, 0xe3}, {&(0x7f0000000480)=""/133, 0x85}, {&(0x7f0000000540)=""/149, 0x95}], 0x5, &(0x7f0000000680)=""/218, 0xda}, 0x64c7}, {{&(0x7f0000000780)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000800)=""/190, 0xbe}, {&(0x7f00000008c0)=""/131, 0x83}, {&(0x7f0000000980)=""/170, 0xaa}, {&(0x7f0000000a40)=""/74, 0x4a}, {&(0x7f0000000ac0)=""/232, 0xe8}, {&(0x7f0000000040)=""/58, 0x3a}, {&(0x7f0000000bc0)=""/200, 0xc8}, {&(0x7f0000000cc0)=""/50, 0x32}], 0x8, &(0x7f0000000d80)=""/35, 0x23}, 0x6}, {{0x0, 0x0, &(0x7f0000000f00)=[{&(0x7f0000000dc0)=""/180, 0xb4}, {&(0x7f0000000e80)=""/85, 0x55}], 0x2, &(0x7f0000000f40)=""/19, 0x13}, 0x4158}, {{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000f80)=""/235, 0xeb}, {&(0x7f0000001080)=""/122, 0x7a}, {&(0x7f0000001100)=""/141, 0x8d}, {&(0x7f00000011c0)=""/70, 0x46}, {&(0x7f0000001240)=""/179, 0xb3}, {&(0x7f0000001300)=""/206, 0xce}], 0x6, &(0x7f0000001480)=""/137, 0x89}, 0xff}, {{&(0x7f0000001540)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000002bc0)=[{&(0x7f00000015c0)=""/193, 0xc1}, {&(0x7f00000016c0)=""/113, 0x71}, {&(0x7f0000001740)=""/201, 0xc9}, {&(0x7f0000001840)=""/111, 0x6f}, {&(0x7f00000018c0)=""/158, 0x9e}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/148, 0x94}, {&(0x7f0000002a40)}, {&(0x7f0000002a80)=""/7, 0x7}, {&(0x7f0000002ac0)=""/204, 0xcc}], 0xa, &(0x7f0000002c80)=""/64, 0x40}, 0x3}, {{&(0x7f0000002cc0)=@pppol2tpin6, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002d40)=""/39, 0x27}, {&(0x7f0000002d80)=""/13, 0xd}], 0x2}, 0x1ff}], 0x7, 0x2000, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000002fc0)={r4, 0x1, 0x6, @broadcast}, 0x10) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:49 executing program 5: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:49 executing program 3 (fault-call:5 fault-nth:5): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 378.500536][T24079] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 378.545403][T24084] FAULT_INJECTION: forcing a failure. [ 378.545403][T24084] name failslab, interval 1, probability 0, space 0, times 0 [ 378.555085][T24082] FAULT_INJECTION: forcing a failure. [ 378.555085][T24082] name failslab, interval 1, probability 0, space 0, times 0 [ 378.575653][T24084] CPU: 1 PID: 24084 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 378.584544][T24084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.594611][T24084] Call Trace: [ 378.597925][T24084] dump_stack+0x172/0x1f0 [ 378.602299][T24084] should_fail.cold+0xa/0x15 [ 378.606933][T24084] ? fault_create_debugfs_attr+0x180/0x180 [ 378.613283][T24084] ? ___might_sleep+0x163/0x2c0 [ 378.618149][T24084] __should_failslab+0x121/0x190 [ 378.623091][T24084] should_failslab+0x9/0x14 [ 378.627606][T24084] kmem_cache_alloc_trace+0x2d3/0x790 [ 378.633088][T24084] mpi_alloc+0x47/0x240 [ 378.637247][T24084] mpi_read_raw_data+0xdc/0x3f0 [ 378.642100][T24084] ? crypto_dh_decode_key+0x578/0x690 [ 378.647477][T24084] dh_set_secret+0x109/0x2e0 [ 378.652071][T24084] ? dh_exit_tfm+0x20/0x20 [ 378.656523][T24084] __keyctl_dh_compute+0x612/0x13b0 [ 378.661730][T24084] ? mark_held_locks+0xa4/0xf0 [ 378.666497][T24084] ? get_pid_task+0xc9/0x190 [ 378.671095][T24084] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 378.677343][T24084] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 378.682808][T24084] ? dh_data_from_key+0x2b0/0x2b0 [ 378.687833][T24084] ? find_held_lock+0x35/0x130 [ 378.692611][T24084] ? __f_unlock_pos+0x19/0x20 [ 378.697311][T24084] ? __kasan_check_write+0x14/0x20 [ 378.702688][T24084] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 378.709475][T24084] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 378.714943][T24084] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 378.720400][T24084] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 378.725859][T24084] ? lockdep_hardirqs_on+0x421/0x5e0 [ 378.731145][T24084] ? retint_kernel+0x2b/0x2b [ 378.735739][T24084] ? trace_hardirqs_on_caller+0x6a/0x240 [ 378.741376][T24084] keyctl_dh_compute+0xcf/0x12d [ 378.746231][T24084] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 378.751698][T24084] ? __this_cpu_preempt_check+0x3a/0x210 [ 378.757335][T24084] ? retint_kernel+0x2b/0x2b [ 378.761942][T24084] __x64_sys_keyctl+0x159/0x490 [ 378.766823][T24084] do_syscall_64+0xfa/0x760 [ 378.771335][T24084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.777256][T24084] RIP: 0033:0x459a09 [ 378.781151][T24084] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.801107][T24084] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 378.809532][T24084] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 378.817522][T24084] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 378.825501][T24084] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 378.833493][T24084] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 378.841548][T24084] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 [ 378.849554][T24082] CPU: 0 PID: 24082 Comm: syz-executor.2 Not tainted 5.3.0-next-20190920 #0 [ 378.858245][T24082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.868435][T24082] Call Trace: [ 378.871752][T24082] dump_stack+0x172/0x1f0 [ 378.876117][T24082] should_fail.cold+0xa/0x15 [ 378.880722][T24082] ? fault_create_debugfs_attr+0x180/0x180 [ 378.886558][T24082] ? ___might_sleep+0x163/0x2c0 [ 378.891447][T24082] __should_failslab+0x121/0x190 [ 378.896391][T24082] should_failslab+0x9/0x14 [ 378.900908][T24082] __kmalloc+0x2e0/0x770 [ 378.905161][T24082] ? __crypto_alg_lookup+0x2fa/0x370 [ 378.910468][T24082] ? crypto_create_tfm+0x82/0x300 [ 378.915545][T24082] crypto_create_tfm+0x82/0x300 [ 378.920406][T24082] ? crypto_alg_mod_lookup+0xff/0x550 [ 378.925788][T24082] crypto_alloc_tfm+0x105/0x2e0 [ 378.930632][T24082] ? memcpy+0x46/0x50 [ 378.930654][T24082] crypto_alloc_kpp+0x2d/0x40 [ 378.930671][T24082] __keyctl_dh_compute+0x580/0x13b0 [ 378.930687][T24082] ? trace_hardirqs_on_caller+0x6a/0x240 [ 378.930700][T24082] ? get_pid_task+0xc9/0x190 [ 378.930714][T24082] ? find_held_lock+0x35/0x130 [ 378.930725][T24082] ? get_pid_task+0xc9/0x190 [ 378.930739][T24082] ? dh_data_from_key+0x2b0/0x2b0 [ 378.930751][T24082] ? find_held_lock+0x35/0x130 [ 378.930768][T24082] ? __f_unlock_pos+0x19/0x20 [ 378.974213][T24082] ? __kasan_check_write+0x14/0x20 [ 378.974230][T24082] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 378.974250][T24082] ? rcu_read_lock_bh_held+0xb0/0xb0 05:23:50 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:50 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = open(0x0, 0x0, 0x0) write$capi20_data(r0, &(0x7f0000000040)={{0x10, 0x9, 0x84, 0x80, 0x3, 0x5}}, 0x12) 05:23:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:50 executing program 3 (fault-call:5 fault-nth:6): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 378.989644][T24082] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 378.989661][T24082] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 378.989678][T24082] ? lockdep_hardirqs_on+0x421/0x5e0 [ 378.989696][T24082] ? retint_kernel+0x2b/0x2b [ 378.989717][T24082] keyctl_dh_compute+0xcf/0x12d [ 378.989731][T24082] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 378.989750][T24082] ? __this_cpu_preempt_check+0x3a/0x210 [ 378.989763][T24082] ? retint_kernel+0x2b/0x2b [ 378.989782][T24082] __x64_sys_keyctl+0x159/0x490 [ 378.989796][T24082] do_syscall_64+0xfa/0x760 [ 378.989812][T24082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.989823][T24082] RIP: 0033:0x459a09 [ 378.989836][T24082] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.989848][T24082] RSP: 002b:00007fba4c05ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 379.026414][T24082] RAX: ffffffffffffffda RBX: 00007fba4c05ec90 RCX: 0000000000459a09 05:23:50 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 379.026425][T24082] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 379.026434][T24082] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 379.026444][T24082] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fba4c05f6d4 [ 379.026452][T24082] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 [ 379.080868][T24194] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:50 executing program 2 (fault-call:6 fault-nth:5): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 379.223081][T24198] FAULT_INJECTION: forcing a failure. [ 379.223081][T24198] name failslab, interval 1, probability 0, space 0, times 0 [ 379.274888][T24198] CPU: 1 PID: 24198 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 379.284153][T24198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.294264][T24198] Call Trace: [ 379.297862][T24198] dump_stack+0x172/0x1f0 [ 379.302249][T24198] should_fail.cold+0xa/0x15 [ 379.306862][T24198] ? fault_create_debugfs_attr+0x180/0x180 [ 379.312692][T24198] ? ___might_sleep+0x163/0x2c0 [ 379.317561][T24198] __should_failslab+0x121/0x190 [ 379.319467][T24306] FAULT_INJECTION: forcing a failure. [ 379.319467][T24306] name failslab, interval 1, probability 0, space 0, times 0 [ 379.322506][T24198] should_failslab+0x9/0x14 [ 379.322526][T24198] __kmalloc+0x2e0/0x770 [ 379.322544][T24198] ? kmem_cache_alloc_trace+0x397/0x790 [ 379.322564][T24198] ? mpi_alloc_limb_space+0x33/0x60 [ 379.322583][T24198] mpi_alloc_limb_space+0x33/0x60 [ 379.359613][T24198] mpi_alloc+0x1a8/0x240 [ 379.363861][T24198] mpi_read_raw_data+0xdc/0x3f0 [ 379.368713][T24198] ? crypto_dh_decode_key+0x578/0x690 [ 379.374108][T24198] dh_set_secret+0x109/0x2e0 [ 379.378707][T24198] ? dh_exit_tfm+0x20/0x20 [ 379.383141][T24198] __keyctl_dh_compute+0x612/0x13b0 [ 379.388345][T24198] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 379.393807][T24198] ? dh_data_from_key+0x2b0/0x2b0 [ 379.398830][T24198] ? find_held_lock+0x35/0x130 [ 379.403590][T24198] ? __f_unlock_pos+0x19/0x20 [ 379.408304][T24198] ? __kasan_check_write+0x14/0x20 [ 379.413424][T24198] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 379.418971][T24198] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 379.424262][T24198] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 379.429726][T24198] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 379.435184][T24198] ? lockdep_hardirqs_on+0x421/0x5e0 [ 379.440464][T24198] ? retint_kernel+0x2b/0x2b [ 379.445055][T24198] keyctl_dh_compute+0xcf/0x12d [ 379.449907][T24198] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 379.455368][T24198] ? __this_cpu_preempt_check+0x3a/0x210 [ 379.461000][T24198] ? retint_kernel+0x2b/0x2b [ 379.465643][T24198] __x64_sys_keyctl+0x159/0x490 [ 379.470497][T24198] do_syscall_64+0xfa/0x760 [ 379.475023][T24198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.480913][T24198] RIP: 0033:0x459a09 [ 379.484809][T24198] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.504413][T24198] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 379.512824][T24198] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 379.520791][T24198] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 379.528759][T24198] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 379.536726][T24198] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 379.544697][T24198] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 [ 379.552695][T24306] CPU: 0 PID: 24306 Comm: syz-executor.2 Not tainted 5.3.0-next-20190920 #0 [ 379.561373][T24306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.571521][T24306] Call Trace: [ 379.574821][T24306] dump_stack+0x172/0x1f0 [ 379.579162][T24306] should_fail.cold+0xa/0x15 [ 379.583764][T24306] ? fault_create_debugfs_attr+0x180/0x180 [ 379.589578][T24306] ? ___might_sleep+0x163/0x2c0 [ 379.589602][T24306] __should_failslab+0x121/0x190 [ 379.589621][T24306] should_failslab+0x9/0x14 [ 379.589638][T24306] kmem_cache_alloc_trace+0x2d3/0x790 [ 379.589662][T24306] mpi_alloc+0x47/0x240 [ 379.589677][T24306] mpi_read_raw_data+0xdc/0x3f0 [ 379.589693][T24306] ? crypto_dh_decode_key+0x578/0x690 [ 379.589714][T24306] dh_set_secret+0x109/0x2e0 [ 379.599472][T24306] ? dh_exit_tfm+0x20/0x20 [ 379.599506][T24306] __keyctl_dh_compute+0x612/0x13b0 [ 379.599521][T24306] ? get_pid_task+0xc9/0x190 [ 379.599538][T24306] ? find_held_lock+0x35/0x130 [ 379.599557][T24306] ? dh_data_from_key+0x2b0/0x2b0 [ 379.599571][T24306] ? find_held_lock+0x35/0x130 [ 379.599586][T24306] ? __f_unlock_pos+0x19/0x20 [ 379.599602][T24306] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 379.599620][T24306] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 379.672937][T24306] ? lockdep_hardirqs_on+0x421/0x5e0 [ 379.678243][T24306] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 379.683706][T24306] ? __this_cpu_preempt_check+0x3a/0x210 [ 379.689350][T24306] ? retint_kernel+0x2b/0x2b [ 379.689381][T24306] keyctl_dh_compute+0xcf/0x12d [ 379.689399][T24306] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 379.689413][T24306] ? fput+0x1b/0x20 [ 379.689426][T24306] ? ksys_write+0x1cf/0x290 [ 379.689446][T24306] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 379.689459][T24306] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 379.689472][T24306] ? do_syscall_64+0x26/0x760 [ 379.689483][T24306] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.689494][T24306] ? do_syscall_64+0x26/0x760 [ 379.689511][T24306] __x64_sys_keyctl+0x159/0x490 [ 379.743871][T24306] do_syscall_64+0xfa/0x760 [ 379.748394][T24306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.754289][T24306] RIP: 0033:0x459a09 [ 379.758192][T24306] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.777806][T24306] RSP: 002b:00007fba4c05ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 379.786256][T24306] RAX: ffffffffffffffda RBX: 00007fba4c05ec90 RCX: 0000000000459a09 [ 379.794224][T24306] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 379.802208][T24306] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 379.810183][T24306] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fba4c05f6d4 [ 379.818149][T24306] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:23:52 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x360f0000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:52 executing program 3 (fault-call:5 fault-nth:7): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:52 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:52 executing program 2 (fault-call:6 fault-nth:6): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:52 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x101800) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000000c0)=0x4af, 0x4) r1 = socket$netlink(0x10, 0x3, 0xa) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) r5 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r5) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000005c0)={r6, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r6, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000100)={r6, 0x1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, &(0x7f0000000180)={r7, 0xdd}, 0x8) r8 = socket$netlink(0x10, 0x3, 0x9) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r8, r9, 0x0, 0xdd) getsockopt$IP_VS_SO_GET_TIMEOUT(r9, 0x0, 0x486, &(0x7f00000001c0), &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000040)={0xfffffffffffffff7}, 0x1) futex(0x0, 0x87, 0xffffffffffffffff, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) r10 = socket$netlink(0x10, 0x3, 0x9) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r10, r11, 0x0, 0xdd) listen(r11, 0xffff) [ 381.597962][T24319] FAULT_INJECTION: forcing a failure. [ 381.597962][T24319] name failslab, interval 1, probability 0, space 0, times 0 [ 381.658394][T24325] FAULT_INJECTION: forcing a failure. [ 381.658394][T24325] name failslab, interval 1, probability 0, space 0, times 0 [ 381.676258][T24325] CPU: 0 PID: 24325 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 381.684981][T24325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.695049][T24325] Call Trace: [ 381.698364][T24325] dump_stack+0x172/0x1f0 [ 381.702722][T24325] should_fail.cold+0xa/0x15 [ 381.707338][T24325] ? fault_create_debugfs_attr+0x180/0x180 [ 381.713169][T24325] ? ___might_sleep+0x163/0x2c0 [ 381.718041][T24325] __should_failslab+0x121/0x190 [ 381.723000][T24325] should_failslab+0x9/0x14 [ 381.727522][T24325] kmem_cache_alloc_trace+0x2d3/0x790 [ 381.732910][T24325] mpi_alloc+0x47/0x240 [ 381.737069][T24325] mpi_read_raw_data+0xdc/0x3f0 [ 381.741938][T24325] dh_set_secret+0x168/0x2e0 [ 381.746530][T24325] ? dh_exit_tfm+0x20/0x20 [ 381.750968][T24325] __keyctl_dh_compute+0x612/0x13b0 [ 381.756192][T24325] ? get_pid_task+0xc9/0x190 [ 381.760789][T24325] ? find_held_lock+0x35/0x130 [ 381.765570][T24325] ? dh_data_from_key+0x2b0/0x2b0 [ 381.770606][T24325] ? find_held_lock+0x35/0x130 [ 381.775372][T24325] ? __f_unlock_pos+0x19/0x20 [ 381.780076][T24325] ? __kasan_check_write+0x14/0x20 [ 381.785194][T24325] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 381.790748][T24325] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 381.796042][T24325] ? wait_for_completion+0x440/0x440 [ 381.801345][T24325] keyctl_dh_compute+0xcf/0x12d [ 381.806207][T24325] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 381.811666][T24325] ? fput+0x1b/0x20 [ 381.815475][T24325] ? ksys_write+0x1cf/0x290 [ 381.820032][T24325] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 381.825520][T24325] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 381.830980][T24325] ? do_syscall_64+0x26/0x760 [ 381.835663][T24325] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.841829][T24325] ? do_syscall_64+0x26/0x760 [ 381.846527][T24325] __x64_sys_keyctl+0x159/0x490 [ 381.851404][T24325] do_syscall_64+0xfa/0x760 05:23:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 381.856021][T24325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.861972][T24325] RIP: 0033:0x459a09 [ 381.865906][T24325] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 381.885521][T24325] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 381.893952][T24325] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 381.901926][T24325] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 381.909900][T24325] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 381.917872][T24325] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 381.925850][T24325] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 [ 381.933868][T24319] CPU: 1 PID: 24319 Comm: syz-executor.2 Not tainted 5.3.0-next-20190920 #0 [ 381.942559][T24319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.952623][T24319] Call Trace: 05:23:53 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 381.952654][T24319] dump_stack+0x172/0x1f0 [ 381.952674][T24319] should_fail.cold+0xa/0x15 [ 381.952697][T24319] ? fault_create_debugfs_attr+0x180/0x180 [ 381.960448][T24319] ? ___might_sleep+0x163/0x2c0 [ 381.960468][T24319] __should_failslab+0x121/0x190 [ 381.960485][T24319] should_failslab+0x9/0x14 [ 381.960501][T24319] __kmalloc+0x2e0/0x770 [ 381.960524][T24319] ? kmem_cache_alloc_trace+0x397/0x790 [ 381.995006][T24319] ? retint_kernel+0x2b/0x2b [ 381.999634][T24319] ? mpi_alloc_limb_space+0x33/0x60 [ 382.004870][T24319] mpi_alloc_limb_space+0x33/0x60 [ 382.009919][T24319] mpi_alloc+0x1a8/0x240 [ 382.014188][T24319] mpi_read_raw_data+0xdc/0x3f0 [ 382.019067][T24319] ? crypto_dh_decode_key+0x578/0x690 [ 382.024470][T24319] dh_set_secret+0x109/0x2e0 [ 382.029083][T24319] ? dh_exit_tfm+0x20/0x20 [ 382.033711][T24319] __keyctl_dh_compute+0x612/0x13b0 [ 382.038932][T24319] ? __kasan_check_read+0x11/0x20 [ 382.043957][T24319] ? mark_lock+0xc2/0x1220 [ 382.048369][T24319] ? find_held_lock+0x35/0x130 [ 382.053132][T24319] ? dh_data_from_key+0x2b0/0x2b0 [ 382.058142][T24319] ? find_held_lock+0x35/0x130 [ 382.062915][T24319] ? __f_unlock_pos+0x19/0x20 [ 382.067615][T24319] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 382.073248][T24319] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 382.078892][T24319] ? lockdep_hardirqs_on+0x421/0x5e0 [ 382.084166][T24319] ? retint_kernel+0x2b/0x2b [ 382.088745][T24319] ? trace_hardirqs_on_caller+0x6a/0x240 [ 382.094407][T24319] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 382.099873][T24319] keyctl_dh_compute+0xcf/0x12d [ 382.104759][T24319] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 382.110223][T24319] ? __x64_sys_keyctl+0xd3/0x490 [ 382.115166][T24319] ? write_comp_data+0x1e/0x70 [ 382.119921][T24319] __x64_sys_keyctl+0x159/0x490 [ 382.124760][T24319] do_syscall_64+0xfa/0x760 [ 382.129258][T24319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.135147][T24319] RIP: 0033:0x459a09 [ 382.139038][T24319] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:23:53 executing program 3 (fault-call:5 fault-nth:8): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 382.159400][T24319] RSP: 002b:00007fba4c05ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 382.167811][T24319] RAX: ffffffffffffffda RBX: 00007fba4c05ec90 RCX: 0000000000459a09 [ 382.175771][T24319] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 382.183739][T24319] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 382.191699][T24319] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fba4c05f6d4 [ 382.199661][T24319] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:23:53 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 382.288705][T24431] FAULT_INJECTION: forcing a failure. [ 382.288705][T24431] name failslab, interval 1, probability 0, space 0, times 0 [ 382.334945][T24431] CPU: 1 PID: 24431 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 382.343870][T24431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.353942][T24431] Call Trace: [ 382.357273][T24431] dump_stack+0x172/0x1f0 [ 382.361811][T24431] should_fail.cold+0xa/0x15 [ 382.366444][T24431] ? fault_create_debugfs_attr+0x180/0x180 [ 382.372285][T24431] ? ___might_sleep+0x163/0x2c0 [ 382.377132][T24431] __should_failslab+0x121/0x190 [ 382.382063][T24431] should_failslab+0x9/0x14 [ 382.386586][T24431] __kmalloc+0x2e0/0x770 [ 382.390831][T24431] ? kmem_cache_alloc_trace+0x397/0x790 [ 382.396379][T24431] ? mpi_alloc_limb_space+0x33/0x60 [ 382.401741][T24431] mpi_alloc_limb_space+0x33/0x60 [ 382.406760][T24431] mpi_alloc+0x1a8/0x240 [ 382.410987][T24431] mpi_read_raw_data+0xdc/0x3f0 [ 382.415829][T24431] dh_set_secret+0x168/0x2e0 [ 382.420404][T24431] ? dh_exit_tfm+0x20/0x20 [ 382.424816][T24431] __keyctl_dh_compute+0x612/0x13b0 [ 382.430107][T24431] ? retint_kernel+0x2b/0x2b [ 382.434687][T24431] ? trace_hardirqs_on_caller+0x6a/0x240 [ 382.440302][T24431] ? get_pid_task+0xc9/0x190 [ 382.444883][T24431] ? dh_data_from_key+0x2b0/0x2b0 [ 382.449932][T24431] ? find_held_lock+0x35/0x130 [ 382.454711][T24431] ? __f_unlock_pos+0x19/0x20 [ 382.459395][T24431] ? __kasan_check_write+0x14/0x20 [ 382.464492][T24431] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 382.470045][T24431] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 382.475317][T24431] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 382.480757][T24431] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 382.486204][T24431] ? lockdep_hardirqs_on+0x421/0x5e0 [ 382.491473][T24431] ? retint_kernel+0x2b/0x2b [ 382.496066][T24431] keyctl_dh_compute+0xcf/0x12d [ 382.500900][T24431] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 382.506346][T24431] ? __this_cpu_preempt_check+0x3a/0x210 [ 382.511978][T24431] ? retint_kernel+0x2b/0x2b [ 382.516575][T24431] __x64_sys_keyctl+0x159/0x490 [ 382.521432][T24431] do_syscall_64+0xfa/0x760 [ 382.525924][T24431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.531798][T24431] RIP: 0033:0x459a09 [ 382.535677][T24431] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.555269][T24431] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 382.563662][T24431] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 382.571616][T24431] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 05:23:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 382.579585][T24431] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 382.587538][T24431] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 382.595496][T24431] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:23:53 executing program 3 (fault-call:5 fault-nth:9): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 382.769981][T24445] FAULT_INJECTION: forcing a failure. [ 382.769981][T24445] name failslab, interval 1, probability 0, space 0, times 0 [ 382.799049][T24445] CPU: 1 PID: 24445 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 382.808133][T24445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.818206][T24445] Call Trace: [ 382.821520][T24445] dump_stack+0x172/0x1f0 [ 382.825877][T24445] should_fail.cold+0xa/0x15 [ 382.830492][T24445] ? fault_create_debugfs_attr+0x180/0x180 [ 382.836309][T24445] ? __should_failslab+0x59/0x190 [ 382.841327][T24445] __should_failslab+0x121/0x190 [ 382.846386][T24445] should_failslab+0x9/0x14 [ 382.851024][T24445] kmem_cache_alloc_trace+0x2d3/0x790 [ 382.856387][T24445] ? mpi_alloc_limb_space+0x33/0x60 [ 382.861577][T24445] mpi_alloc+0x47/0x240 [ 382.865741][T24445] mpi_read_raw_data+0xdc/0x3f0 [ 382.870600][T24445] dh_set_secret+0x1a8/0x2e0 [ 382.875181][T24445] ? dh_exit_tfm+0x20/0x20 [ 382.879677][T24445] __keyctl_dh_compute+0x612/0x13b0 [ 382.884880][T24445] ? get_pid_task+0xc9/0x190 [ 382.889554][T24445] ? find_held_lock+0x35/0x130 [ 382.894309][T24445] ? dh_data_from_key+0x2b0/0x2b0 [ 382.899345][T24445] ? find_held_lock+0x35/0x130 [ 382.904127][T24445] ? __f_unlock_pos+0x19/0x20 [ 382.908813][T24445] ? __kasan_check_write+0x14/0x20 [ 382.913919][T24445] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 382.919463][T24445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.925715][T24445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.931949][T24445] ? debug_smp_processor_id+0x3c/0x214 [ 382.937408][T24445] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 382.943554][T24445] keyctl_dh_compute+0xcf/0x12d [ 382.948391][T24445] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 382.953835][T24445] ? fput+0x1b/0x20 [ 382.957647][T24445] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.963889][T24445] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 382.969346][T24445] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 382.974830][T24445] ? do_syscall_64+0x26/0x760 [ 382.979503][T24445] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.985561][T24445] ? do_syscall_64+0x26/0x760 [ 382.990249][T24445] __x64_sys_keyctl+0x159/0x490 [ 382.995091][T24445] do_syscall_64+0xfa/0x760 [ 382.999605][T24445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.005489][T24445] RIP: 0033:0x459a09 [ 383.009369][T24445] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.028964][T24445] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 383.037361][T24445] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 383.045330][T24445] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 383.053307][T24445] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 383.061361][T24445] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 383.069335][T24445] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:23:55 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2, 0x0) ioctl$KVM_GET_LAPIC(r0, 0x8400ae8e, &(0x7f0000000080)={"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"}) open(0x0, 0x0, 0x0) 05:23:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x48000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:55 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:55 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:55 executing program 3 (fault-call:5 fault-nth:10): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:55 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 384.705811][T24459] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 384.739829][T24458] FAULT_INJECTION: forcing a failure. [ 384.739829][T24458] name failslab, interval 1, probability 0, space 0, times 0 05:23:56 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 384.784359][T24458] CPU: 1 PID: 24458 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 384.793081][T24458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.793091][T24458] Call Trace: [ 384.793117][T24458] dump_stack+0x172/0x1f0 [ 384.793139][T24458] should_fail.cold+0xa/0x15 [ 384.793160][T24458] ? fault_create_debugfs_attr+0x180/0x180 [ 384.824068][T24458] ? ___might_sleep+0x163/0x2c0 [ 384.828968][T24458] __should_failslab+0x121/0x190 [ 384.828989][T24458] should_failslab+0x9/0x14 [ 384.829010][T24458] __kmalloc+0x2e0/0x770 [ 384.829031][T24458] ? kmem_cache_alloc_trace+0x397/0x790 [ 384.848372][T24458] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 384.853872][T24458] ? mpi_alloc_limb_space+0x33/0x60 [ 384.859137][T24458] mpi_alloc_limb_space+0x33/0x60 [ 384.864202][T24458] mpi_alloc+0x1a8/0x240 [ 384.868647][T24458] mpi_read_raw_data+0xdc/0x3f0 [ 384.873534][T24458] dh_set_secret+0x1a8/0x2e0 [ 384.878153][T24458] ? dh_exit_tfm+0x20/0x20 [ 384.882620][T24458] __keyctl_dh_compute+0x612/0x13b0 [ 384.887867][T24458] ? dh_data_from_key+0x2b0/0x2b0 [ 384.892914][T24458] ? find_held_lock+0x35/0x130 [ 384.898051][T24458] ? __f_unlock_pos+0x19/0x20 [ 384.902764][T24458] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 384.908251][T24458] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 384.913817][T24458] ? __kasan_check_write+0x14/0x20 [ 384.918948][T24458] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 384.924602][T24458] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 384.930074][T24458] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 384.935559][T24458] ? lockdep_hardirqs_on+0x421/0x5e0 [ 384.940855][T24458] ? retint_kernel+0x2b/0x2b [ 384.945641][T24458] ? trace_hardirqs_on_caller+0x6a/0x240 [ 384.951326][T24458] keyctl_dh_compute+0xcf/0x12d [ 384.956210][T24458] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 384.961683][T24458] ? __this_cpu_preempt_check+0x3a/0x210 [ 384.967443][T24458] ? retint_kernel+0x2b/0x2b [ 384.972253][T24458] __x64_sys_keyctl+0x159/0x490 [ 384.977294][T24458] do_syscall_64+0xfa/0x760 [ 384.981831][T24458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.987738][T24458] RIP: 0033:0x459a09 [ 384.991643][T24458] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.011280][T24458] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 385.019716][T24458] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 385.027708][T24458] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 385.035738][T24458] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 385.043733][T24458] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 385.051730][T24458] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:23:56 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x2, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x68000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:56 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x3, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:56 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input+evEnt#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x41a402, 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r1) setsockopt$inet_mreqn(r1, 0x0, 0x7, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local}, 0xc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0)={r3}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000005c0)={r3, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r3, 0x40, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x3, 0x840a, 0x82, 0x7989, r3}, 0x10) open(0x0, 0x0, 0x0) 05:23:56 executing program 3 (fault-call:5 fault-nth:11): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 385.376748][T24582] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:56 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x4, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x74000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 385.540382][T24611] FAULT_INJECTION: forcing a failure. [ 385.540382][T24611] name failslab, interval 1, probability 0, space 0, times 0 [ 385.560653][T24611] CPU: 0 PID: 24611 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 385.569665][T24611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.579818][T24611] Call Trace: [ 385.583130][T24611] dump_stack+0x172/0x1f0 [ 385.587576][T24611] should_fail.cold+0xa/0x15 [ 385.592191][T24611] ? fault_create_debugfs_attr+0x180/0x180 [ 385.598030][T24611] ? ___might_sleep+0x163/0x2c0 [ 385.602899][T24611] __should_failslab+0x121/0x190 [ 385.607855][T24611] should_failslab+0x9/0x14 [ 385.612746][T24611] __kmalloc+0x2e0/0x770 [ 385.617008][T24611] ? __keyctl_dh_compute+0x6ce/0x13b0 [ 385.622411][T24611] __keyctl_dh_compute+0x6ce/0x13b0 [ 385.627621][T24611] ? trace_hardirqs_on_caller+0x6a/0x240 [ 385.633378][T24611] ? dh_data_from_key+0x2b0/0x2b0 [ 385.638418][T24611] ? find_held_lock+0x35/0x130 [ 385.643190][T24611] ? __f_unlock_pos+0x19/0x20 [ 385.647885][T24611] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 385.653378][T24611] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 385.660103][T24611] ? __kasan_check_write+0x14/0x20 [ 385.665230][T24611] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 385.670786][T24611] ? wait_for_completion+0x440/0x440 [ 385.676081][T24611] ? __f_unlock_pos+0x19/0x20 [ 385.680784][T24611] keyctl_dh_compute+0xcf/0x12d [ 385.685652][T24611] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 385.691119][T24611] ? fput+0x1b/0x20 [ 385.695052][T24611] ? ksys_write+0x1cf/0x290 [ 385.699555][T24611] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 385.705152][T24611] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 385.710608][T24611] ? do_syscall_64+0x26/0x760 [ 385.715281][T24611] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.721523][T24611] ? do_syscall_64+0x26/0x760 [ 385.726454][T24611] __x64_sys_keyctl+0x159/0x490 [ 385.731313][T24611] do_syscall_64+0xfa/0x760 [ 385.735820][T24611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.741710][T24611] RIP: 0033:0x459a09 [ 385.745740][T24611] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.766400][T24611] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 385.774902][T24611] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 385.782874][T24611] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 385.790851][T24611] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 385.798832][T24611] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 385.806795][T24611] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:23:59 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:59 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x5, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:59 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:23:59 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x8000) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000080)=""/133) open(0x0, 0x0, 0x0) 05:23:59 executing program 3 (fault-call:5 fault-nth:12): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 387.937448][T24709] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:23:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 387.994432][T24707] FAULT_INJECTION: forcing a failure. [ 387.994432][T24707] name failslab, interval 1, probability 0, space 0, times 0 [ 388.043710][T24707] CPU: 1 PID: 24707 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 388.052438][T24707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.062534][T24707] Call Trace: [ 388.065856][T24707] dump_stack+0x172/0x1f0 [ 388.070220][T24707] should_fail.cold+0xa/0x15 [ 388.074842][T24707] ? fault_create_debugfs_attr+0x180/0x180 [ 388.080683][T24707] ? ___might_sleep+0x163/0x2c0 [ 388.085568][T24707] __should_failslab+0x121/0x190 [ 388.090546][T24707] should_failslab+0x9/0x14 [ 388.095068][T24707] __kmalloc+0x2e0/0x770 [ 388.099333][T24707] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 388.105587][T24707] ? __phys_addr+0xa4/0x120 [ 388.110115][T24707] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 388.116371][T24707] ? __keyctl_dh_compute+0x760/0x13b0 [ 388.121771][T24707] __keyctl_dh_compute+0x760/0x13b0 [ 388.126989][T24707] ? retint_kernel+0x2b/0x2b [ 388.131608][T24707] ? dh_data_from_key+0x2b0/0x2b0 [ 388.137786][T24707] ? find_held_lock+0x35/0x130 [ 388.142574][T24707] ? __f_unlock_pos+0x19/0x20 [ 388.147303][T24707] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 388.152795][T24707] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 388.158490][T24707] ? lockdep_hardirqs_on+0x421/0x5e0 [ 388.163799][T24707] ? retint_kernel+0x2b/0x2b [ 388.168408][T24707] ? trace_hardirqs_on_caller+0x6a/0x240 [ 388.174069][T24707] keyctl_dh_compute+0xcf/0x12d [ 388.178933][T24707] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 388.184431][T24707] ? retint_kernel+0x2b/0x2b [ 388.189034][T24707] ? __x64_sys_keyctl+0xd3/0x490 [ 388.193989][T24707] __x64_sys_keyctl+0x159/0x490 [ 388.198965][T24707] do_syscall_64+0xfa/0x760 [ 388.203566][T24707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.209549][T24707] RIP: 0033:0x459a09 [ 388.213443][T24707] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.233158][T24707] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 05:23:59 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x6, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 388.241737][T24707] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 388.250837][T24707] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 388.258806][T24707] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 388.267031][T24707] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 388.275128][T24707] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:23:59 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:23:59 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x7, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:23:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:23:59 executing program 3 (fault-call:5 fault-nth:13): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 388.406837][T24828] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 388.592587][T24918] FAULT_INJECTION: forcing a failure. [ 388.592587][T24918] name failslab, interval 1, probability 0, space 0, times 0 [ 388.607821][T24918] CPU: 0 PID: 24918 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 388.616538][T24918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.626609][T24918] Call Trace: [ 388.629919][T24918] dump_stack+0x172/0x1f0 [ 388.634274][T24918] should_fail.cold+0xa/0x15 [ 388.638893][T24918] ? fault_create_debugfs_attr+0x180/0x180 [ 388.644729][T24918] ? ___might_sleep+0x163/0x2c0 [ 388.649604][T24918] __should_failslab+0x121/0x190 [ 388.654565][T24918] should_failslab+0x9/0x14 [ 388.659341][T24918] kmem_cache_alloc_trace+0x2d3/0x790 [ 388.664719][T24918] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 388.671033][T24918] mpi_alloc+0x47/0x240 [ 388.675240][T24918] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 388.681230][T24918] dh_compute_value+0x93/0x610 [ 388.686006][T24918] ? dh_exit+0x20/0x20 [ 388.691038][T24918] ? lockdep_init_map+0x1be/0x6d0 [ 388.696073][T24918] __keyctl_dh_compute+0x9a0/0x13b0 [ 388.701271][T24918] ? retint_kernel+0x2b/0x2b [ 388.705981][T24918] ? dh_data_from_key+0x2b0/0x2b0 [ 388.711014][T24918] ? find_held_lock+0x35/0x130 [ 388.715775][T24918] ? __f_unlock_pos+0x19/0x20 [ 388.720733][T24918] ? __kasan_check_write+0x14/0x20 [ 388.725857][T24918] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 388.731468][T24918] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 388.736863][T24918] ? wait_for_completion+0x440/0x440 [ 388.742180][T24918] keyctl_dh_compute+0xcf/0x12d [ 388.747060][T24918] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 388.752515][T24918] ? fput+0x1b/0x20 [ 388.756323][T24918] ? ksys_write+0x1cf/0x290 [ 388.760837][T24918] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 388.766312][T24918] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 388.771770][T24918] ? do_syscall_64+0x26/0x760 [ 388.776452][T24918] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.782540][T24918] ? do_syscall_64+0x26/0x760 [ 388.787247][T24918] __x64_sys_keyctl+0x159/0x490 [ 388.792088][T24918] do_syscall_64+0xfa/0x760 [ 388.796586][T24918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.802906][T24918] RIP: 0033:0x459a09 [ 388.806894][T24918] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 388.826504][T24918] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 388.834921][T24918] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 388.842890][T24918] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 388.852015][T24918] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 388.859994][T24918] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 388.867964][T24918] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:24:02 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:02 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x8, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:02 executing program 3 (fault-call:5 fault-nth:14): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:02 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x84, 0x0, 0x0, 0x0, 0xa1f40000) prctl$PR_SVE_SET_VL(0x32, 0x268bf) open(0x0, 0x1, 0x8) 05:24:02 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:02 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x9, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 391.171258][T24949] FAULT_INJECTION: forcing a failure. [ 391.171258][T24949] name failslab, interval 1, probability 0, space 0, times 0 [ 391.223451][T24949] CPU: 1 PID: 24949 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 391.232181][T24949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.242263][T24949] Call Trace: [ 391.245589][T24949] dump_stack+0x172/0x1f0 [ 391.249948][T24949] should_fail.cold+0xa/0x15 [ 391.254720][T24949] ? fault_create_debugfs_attr+0x180/0x180 [ 391.260562][T24949] ? ___might_sleep+0x163/0x2c0 [ 391.265437][T24949] __should_failslab+0x121/0x190 [ 391.270396][T24949] should_failslab+0x9/0x14 [ 391.274925][T24949] __kmalloc+0x2e0/0x770 [ 391.279197][T24949] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 391.284679][T24949] ? mpi_alloc_limb_space+0x33/0x60 [ 391.289897][T24949] mpi_alloc_limb_space+0x33/0x60 [ 391.294969][T24949] mpi_powm+0x45e/0x1d20 [ 391.299217][T24949] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 391.305384][T24949] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 391.310951][T24949] ? mpihelp_mul_karatsuba_case+0xd80/0xd80 [ 391.316871][T24949] ? kmem_cache_alloc_trace+0x397/0x790 05:24:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 391.322707][T24949] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 391.328890][T24949] dh_compute_value+0x373/0x610 [ 391.333765][T24949] ? dh_exit+0x20/0x20 [ 391.337911][T24949] ? lockdep_init_map+0x1be/0x6d0 [ 391.342958][T24949] __keyctl_dh_compute+0x9a0/0x13b0 [ 391.348206][T24949] ? get_pid_task+0xc9/0x190 [ 391.352818][T24949] ? dh_data_from_key+0x2b0/0x2b0 [ 391.357859][T24949] ? find_held_lock+0x35/0x130 [ 391.362833][T24949] ? __f_unlock_pos+0x19/0x20 [ 391.367558][T24949] ? __kasan_check_write+0x14/0x20 [ 391.372692][T24949] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 391.378420][T24949] ? retint_kernel+0x2b/0x2b [ 391.383026][T24949] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 391.388494][T24949] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 391.393956][T24949] ? lockdep_hardirqs_on+0x421/0x5e0 [ 391.399343][T24949] ? retint_kernel+0x2b/0x2b [ 391.403934][T24949] keyctl_dh_compute+0xcf/0x12d [ 391.408769][T24949] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 391.414216][T24949] ? __this_cpu_preempt_check+0x3a/0x210 [ 391.419851][T24949] ? retint_kernel+0x2b/0x2b [ 391.424437][T24949] __x64_sys_keyctl+0x159/0x490 [ 391.429281][T24949] do_syscall_64+0xfa/0x760 [ 391.433781][T24949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.439671][T24949] RIP: 0033:0x459a09 [ 391.443559][T24949] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 391.463507][T24949] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 391.472014][T24949] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 391.479986][T24949] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 391.487949][T24949] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 391.496169][T24949] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 391.504123][T24949] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:24:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x7, &(0x7f0000000080)=""/150) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x92200) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:24:02 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xa, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 391.664190][T25069] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:02 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xb, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:05 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:05 executing program 3 (fault-call:5 fault-nth:15): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:05 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xc, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:05 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:05 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x404200, 0x0) fanotify_mark(r0, 0x1, 0x40000000, 0xffffffffffffff9c, &(0x7f00000023c0)='./file0\x00') syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) preadv(r2, &(0x7f0000002340)=[{&(0x7f0000000040)=""/227, 0xe3}, {&(0x7f0000000140)}, {&(0x7f0000000180)=""/68, 0x44}, {&(0x7f0000000200)=""/239, 0xef}, {&(0x7f0000000300)=""/18, 0x12}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/4096, 0x1000}], 0x7, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:24:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:05 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xd, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 394.238753][T25198] FAULT_INJECTION: forcing a failure. [ 394.238753][T25198] name failslab, interval 1, probability 0, space 0, times 0 [ 394.267751][T25201] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 394.371746][T25198] CPU: 0 PID: 25198 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 394.380478][T25198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.390550][T25198] Call Trace: [ 394.393865][T25198] dump_stack+0x172/0x1f0 [ 394.398222][T25198] should_fail.cold+0xa/0x15 [ 394.402876][T25198] ? fault_create_debugfs_attr+0x180/0x180 [ 394.408712][T25198] ? ___might_sleep+0x163/0x2c0 [ 394.413617][T25198] __should_failslab+0x121/0x190 [ 394.418660][T25198] should_failslab+0x9/0x14 [ 394.423182][T25198] __kmalloc+0x2e0/0x770 [ 394.427436][T25198] ? __this_cpu_preempt_check+0x3a/0x210 [ 394.433169][T25198] ? retint_kernel+0x2b/0x2b [ 394.437774][T25198] ? mpi_resize+0x17a/0x207 [ 394.442305][T25198] mpi_resize+0x17a/0x207 [ 394.446653][T25198] mpi_powm+0x787/0x1d20 [ 394.450926][T25198] ? mpihelp_mul_karatsuba_case+0xd80/0xd80 [ 394.456850][T25198] ? kmem_cache_alloc_trace+0x397/0x790 [ 394.462691][T25198] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 394.468882][T25198] dh_compute_value+0x373/0x610 [ 394.473760][T25198] ? dh_exit+0x20/0x20 [ 394.477855][T25198] ? lockdep_init_map+0x1be/0x6d0 [ 394.482929][T25198] __keyctl_dh_compute+0x9a0/0x13b0 [ 394.488422][T25198] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 394.493916][T25198] ? dh_data_from_key+0x2b0/0x2b0 [ 394.498972][T25198] ? find_held_lock+0x35/0x130 [ 394.503755][T25198] ? __f_unlock_pos+0x19/0x20 [ 394.508481][T25198] ? __kasan_check_write+0x14/0x20 [ 394.513612][T25198] ? __mutex_unlock_slowpath+0xf8/0x6b0 05:24:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xff000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:05 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xe, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 394.519219][T25198] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 394.524526][T25198] ? wait_for_completion+0x440/0x440 [ 394.529853][T25198] keyctl_dh_compute+0xcf/0x12d [ 394.534712][T25198] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 394.540185][T25198] ? fput+0x1b/0x20 [ 394.544052][T25198] ? ksys_write+0x1cf/0x290 [ 394.548583][T25198] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 394.554072][T25198] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 394.559544][T25198] ? do_syscall_64+0x26/0x760 [ 394.559563][T25198] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.559575][T25198] ? do_syscall_64+0x26/0x760 [ 394.559594][T25198] __x64_sys_keyctl+0x159/0x490 [ 394.559611][T25198] do_syscall_64+0xfa/0x760 [ 394.559628][T25198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.559645][T25198] RIP: 0033:0x459a09 [ 394.570361][T25198] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 394.570369][T25198] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 05:24:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@func={0xb, 0x0, 0x0, 0xc, 0x4}, @const={0x8, 0x0, 0x0, 0xa, 0x3}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x61, 0x0, 0x1c, 0x4aa908a4218dfe6f}]}, {0x0, [0x5f, 0xacfd5d1a0bc91638, 0x5f, 0x51, 0x30]}}, &(0x7f00000000c0)=""/233, 0x47, 0xe9}, 0x20) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/evenJ#\x00', 0x43, 0x188000) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:24:05 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 394.570385][T25198] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 394.570393][T25198] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 394.570399][T25198] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 394.570407][T25198] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 394.570413][T25198] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:24:05 executing program 3 (fault-call:5 fault-nth:16): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 394.702400][T25315] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:06 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xf, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:06 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 394.941259][T25428] FAULT_INJECTION: forcing a failure. [ 394.941259][T25428] name failslab, interval 1, probability 0, space 0, times 0 [ 394.988305][T25428] CPU: 0 PID: 25428 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 394.997041][T25428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.007130][T25428] Call Trace: [ 395.007161][T25428] dump_stack+0x172/0x1f0 [ 395.007182][T25428] should_fail.cold+0xa/0x15 [ 395.007201][T25428] ? fault_create_debugfs_attr+0x180/0x180 [ 395.007223][T25428] ? ___might_sleep+0x163/0x2c0 [ 395.007247][T25428] __should_failslab+0x121/0x190 [ 395.007268][T25428] should_failslab+0x9/0x14 [ 395.007291][T25428] __kmalloc+0x2e0/0x770 [ 395.019480][T25428] ? mpi_resize+0x17a/0x207 [ 395.019504][T25428] ? mpi_alloc_limb_space+0x33/0x60 [ 395.019520][T25428] mpi_alloc_limb_space+0x33/0x60 [ 395.019533][T25428] mpi_powm+0xc71/0x1d20 [ 395.019561][T25428] ? mpihelp_mul_karatsuba_case+0xd80/0xd80 [ 395.068909][T25428] ? kmem_cache_alloc_trace+0x397/0x790 [ 395.074497][T25428] dh_compute_value+0x373/0x610 [ 395.079379][T25428] ? dh_exit+0x20/0x20 [ 395.083479][T25428] ? lockdep_init_map+0x1be/0x6d0 [ 395.088546][T25428] __keyctl_dh_compute+0x9a0/0x13b0 [ 395.093760][T25428] ? lockdep_hardirqs_on+0x421/0x5e0 [ 395.099160][T25428] ? retint_kernel+0x2b/0x2b [ 395.103767][T25428] ? trace_hardirqs_on_caller+0x6a/0x240 [ 395.109432][T25428] ? dh_data_from_key+0x2b0/0x2b0 [ 395.115149][T25428] ? find_held_lock+0x35/0x130 [ 395.119921][T25428] ? __f_unlock_pos+0x19/0x20 [ 395.119954][T25428] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 395.119966][T25428] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 395.119980][T25428] ? lockdep_hardirqs_on+0x421/0x5e0 [ 395.119996][T25428] ? retint_kernel+0x2b/0x2b [ 395.120009][T25428] ? trace_hardirqs_on_caller+0x6a/0x240 [ 395.120034][T25428] keyctl_dh_compute+0xcf/0x12d [ 395.156827][T25428] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 395.162479][T25428] ? retint_kernel+0x2b/0x2b [ 395.167089][T25428] ? __x64_sys_keyctl+0xd3/0x490 [ 395.172053][T25428] __x64_sys_keyctl+0x159/0x490 [ 395.176923][T25428] do_syscall_64+0xfa/0x760 [ 395.181452][T25428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.187361][T25428] RIP: 0033:0x459a09 [ 395.191272][T25428] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 395.211006][T25428] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 395.219563][T25428] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 [ 395.227542][T25428] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 395.235636][T25428] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 395.243595][T25428] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 395.251561][T25428] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:24:08 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:08 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000040)) 05:24:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:08 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x10, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:08 executing program 0: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:08 executing program 3 (fault-call:5 fault-nth:17): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 397.278564][T25445] FAULT_INJECTION: forcing a failure. [ 397.278564][T25445] name failslab, interval 1, probability 0, space 0, times 0 [ 397.309573][T25450] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 397.330281][T25445] CPU: 0 PID: 25445 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 397.339002][T25445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.349232][T25445] Call Trace: [ 397.352697][T25445] dump_stack+0x172/0x1f0 [ 397.357111][T25445] should_fail.cold+0xa/0x15 [ 397.361689][T25445] ? fault_create_debugfs_attr+0x180/0x180 [ 397.367484][T25445] ? ___might_sleep+0x163/0x2c0 [ 397.372409][T25445] __should_failslab+0x121/0x190 [ 397.377513][T25445] should_failslab+0x9/0x14 [ 397.382029][T25445] __kmalloc+0x2e0/0x770 [ 397.386283][T25445] ? mpi_alloc_limb_space+0x33/0x60 [ 397.391565][T25445] mpi_alloc_limb_space+0x33/0x60 [ 397.396663][T25445] mpi_powm+0x10e8/0x1d20 [ 397.400988][T25445] ? mpihelp_mul_karatsuba_case+0xd80/0xd80 [ 397.406868][T25445] ? kmem_cache_alloc_trace+0x397/0x790 [ 397.412402][T25445] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 397.418549][T25445] dh_compute_value+0x373/0x610 [ 397.423477][T25445] ? dh_exit+0x20/0x20 [ 397.427532][T25445] ? lockdep_init_map+0x1be/0x6d0 [ 397.432546][T25445] __keyctl_dh_compute+0x9a0/0x13b0 [ 397.437747][T25445] ? __kasan_check_read+0x11/0x20 [ 397.442782][T25445] ? dh_data_from_key+0x2b0/0x2b0 [ 397.447879][T25445] ? find_held_lock+0x35/0x130 [ 397.452627][T25445] ? __f_unlock_pos+0x19/0x20 [ 397.457295][T25445] ? retint_kernel+0x2b/0x2b [ 397.461880][T25445] ? __kasan_check_write+0x14/0x20 [ 397.466989][T25445] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 397.472634][T25445] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 397.478080][T25445] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 397.483770][T25445] ? lockdep_hardirqs_on+0x421/0x5e0 [ 397.489078][T25445] ? retint_kernel+0x2b/0x2b [ 397.493669][T25445] ? trace_hardirqs_on_caller+0x6a/0x240 [ 397.499383][T25445] keyctl_dh_compute+0xcf/0x12d [ 397.504317][T25445] ? __keyctl_dh_compute+0x13b0/0x13b0 [ 397.509762][T25445] ? __this_cpu_preempt_check+0x3a/0x210 [ 397.515381][T25445] ? retint_kernel+0x2b/0x2b [ 397.520016][T25445] __x64_sys_keyctl+0x159/0x490 [ 397.524877][T25445] do_syscall_64+0xfa/0x760 [ 397.529732][T25445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.535920][T25445] RIP: 0033:0x459a09 [ 397.539804][T25445] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 397.559401][T25445] RSP: 002b:00007fb927b0ec78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 397.568232][T25445] RAX: ffffffffffffffda RBX: 00007fb927b0ec90 RCX: 0000000000459a09 05:24:08 executing program 0: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 397.576186][T25445] RDX: 00000000200000c0 RSI: 0000000020000140 RDI: 0000000000000017 [ 397.584241][T25445] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 397.592195][T25445] R10: fffffffffffffe4f R11: 0000000000000246 R12: 00007fb927b0f6d4 [ 397.600152][T25445] R13: 00000000004c5c0c R14: 00000000004da568 R15: 0000000000000004 05:24:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:08 executing program 3 (fault-call:5 fault-nth:18): ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:09 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101800, 0x0) ioctl$TCGETX(r0, 0x5432, &(0x7f0000000080)) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) lookup_dcookie(0x80000000, &(0x7f00000000c0)=""/227, 0xe3) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:24:09 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x11, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 397.918421][T25570] QAT: Invalid ioctl 05:24:09 executing program 0: r0 = syz_open_dev$dspn(0x0, 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 397.940232][T25570] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:11 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:11 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:11 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x12, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:11 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:11 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x820004, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x100, 0x400000) ioctl$TCSBRKP(r1, 0x5425, 0x4) fadvise64(r0, 0x0, 0xafa, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$rds(0x15, 0x5, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x200, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f00000000c0)=0x100000001) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) [ 400.391124][T25690] Unknown ioctl 8705 [ 400.414803][T25690] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:11 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x13, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:11 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:12 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x2, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:12 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x14, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:12 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x8000) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) [ 400.975189][T25822] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:14 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:14 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x0, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:14 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x3, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:14 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x15, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:14 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000040)={0xc, 0xfffffffffffff43a, 0x100000001}) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x402, 0x92) [ 403.424376][T25931] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:14 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:14 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x16, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:14 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x4, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:15 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/de-vant#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:24:15 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 403.922743][T26065] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:17 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:17 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x5, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:17 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x18, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:17 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000040)=0x1) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000000dc0)=[{{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/233, 0xe9}, {&(0x7f0000000200)=""/189, 0xbd}, {&(0x7f0000000380)=""/208, 0xd0}, {&(0x7f00000002c0)=""/39, 0x27}, {&(0x7f0000000480)=""/218, 0xda}, {&(0x7f0000000580)=""/105, 0x69}, {&(0x7f0000000600)=""/133, 0x85}], 0x7}, 0x4}, {{&(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000007c0)=""/132, 0x84}, {&(0x7f0000000880)=""/149, 0x95}, {&(0x7f0000000300)=""/2, 0x2}, {&(0x7f0000000940)=""/33, 0x21}, {&(0x7f0000000980)=""/81, 0x51}, {&(0x7f0000000a00)}, {&(0x7f0000000a40)=""/102, 0x66}], 0x7, &(0x7f0000000b40)=""/205, 0xcd}, 0x3f}, {{&(0x7f0000000c40)=@isdn, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000cc0)=""/83, 0x53}], 0x1, &(0x7f0000000d80)=""/19, 0x13}, 0x1}], 0x3, 0x11021, &(0x7f0000000e80)={0x0, 0x989680}) futex(0x0, 0x3, 0xfffffffffffffffe, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:24:17 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:17 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x19, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x20000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:18 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x6, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:18 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/d\x05\x17t#\x00', 0xffffffff, 0x80) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000080)) open(0x0, 0x0, 0x0) [ 406.934802][T26298] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:18 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x1b, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:20 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:20 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x7, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:20 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x1c, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:20 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x2, 0x100) [ 409.707815][T26421] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:21 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x1d, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:21 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:21 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x8, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:21 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x1e, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:21 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='oProc-\x00', 0x2, 0x0) sched_getscheduler(0xffffffffffffffff) flock(r0, 0x8) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000080)={0x0, 0x100000000, 0x0, 0x0, 0x5, 0x3, 0xfffffffffffffffc, 0x0, 0x9, 0x9, 0x9, 0xff, 0x0, 0xfffffffffffffeff, 0x6, 0xfcf, 0x1, 0x6, 0xfffffffffffffff7}) sendfile(r1, r2, 0x0, 0xdd) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000040)) open(0x0, 0x0, 0x0) 05:24:21 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x9, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 410.138922][T26547] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:24 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:24 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x21, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:24 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xa, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:24 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000140)={{0x4, 0x0, @identifier="e1c2e6ff249e86cecfea3b6381fc9327"}}) r1 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xffffffffffffffff, 0x80) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000200)) open(0x0, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r3) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f00000000c0)={r5}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000005c0)={r5, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r5, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={r5, 0x7}, &(0x7f00000000c0)=0xc) [ 412.787983][T26661] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:24 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xb, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:24 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2a0a80100000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:24 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0x88, 0x0) 05:24:24 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xc, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:24 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = open(0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$TCSBRK(r4, 0x5409, 0x5) sendfile(r1, r2, 0x0, 0xdd) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) r6 = getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='fuseblk\x00', 0x1882020, &(0x7f00000002c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other='allow_other'}], [{@obj_role={'obj_role'}}, {@fowner_eq={'fowner', 0x3d, r7}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@pcr={'pcr', 0x3d, 0x8}}]}}) 05:24:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 413.170723][T26790] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:27 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:27 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xd, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:27 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xffffffff00000088, 0x0) 05:24:27 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) sendfile(r0, r3, 0x0, 0xde) openat$cgroup_ro(r1, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) 05:24:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 415.877053][T26910] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:27 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:27 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xe, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:27 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 05:24:27 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xffffffffffff0088, 0x0) 05:24:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 416.245827][T27029] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:30 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:30 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xf, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:30 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) ptrace$peek(0x1, r0, &(0x7f0000000080)) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r1 = open(0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) bind$bt_sco(r1, &(0x7f00000000c0)={0x1f, {0x4, 0x7, 0x6, 0x4, 0x80, 0x5a34}}, 0x8) 05:24:30 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78d, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x44, r3, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}]}, 0x44}}, 0x20000000) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:30 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x10, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 418.969385][T27152] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:30 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:30 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x11, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:30 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r3, r4) 05:24:30 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:24:30 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x12, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 419.327586][T27273] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:33 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:33 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x13, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:33 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x290fc1, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000080)=""/213) open(0x0, 0x0, 0x0) 05:24:33 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000280)={r3, &(0x7f0000000480)="f1b2965a5bce5ab7be14fbbb21b03705d21e4055384ed37b34175e86f0aeba65b7729c0bdedbdc12c76e305e4a2d5cf674b5abf4a4aa7a84c3f4aa1f2b3caa02c8d205ae8d68b9525b6a8d950b85c802ca7f9b8f5235225c089fa7dee4f14673aad48f83c627004dbd03cfbf919279b1f4b85afb089a89c5bf784cd5b7d9c6a2c177b887c660c5e2742547d424f6a4d7c736669587", &(0x7f0000000000)=""/10, 0x4}, 0x20) [ 421.997524][T27397] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:33 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x14, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:33 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:33 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x15, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:33 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) 05:24:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:33 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x5, 0x10000) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000340)={0x0, 0x0, {0x8, 0x1f, 0x300f, 0x8, 0x0, 0x2, 0x7, 0x3}}) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:36 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:36 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x16, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:36 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(0x0, 0x0, 0x0) 05:24:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:36 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r6 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r6, r7, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_i', @ANYRESDEC=r7, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) r8 = getuid() r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000600)='/proc/capi/capi20ncci\x00', 0x800c0, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='fuseblk\x00', 0x4000090, &(0x7f0000000480)={{'fd', 0x3d, r9}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xe00}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}], [{@fsuuid={'fsuuid', 0x3d, {[0x66, 0xce, 0x65, 0x34, 0x37, 0x63, 0x64, 0x62], 0x2d, [0x65, 0xd, 0x35, 0x949a294bfa326d82], 0x2d, [0x29, 0x62, 0x33, 0x37], 0x2d, [0x789eb9cf2330de10, 0x5c, 0x38, 0x61], 0x2d, [0x61, 0x38, 0x64, 0x64, 0x31, 0x39, 0x44f986d9c0de910e, 0x63]}}}, {@euid_eq={'euid', 0x3d, r8}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}]}}) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r10, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x360f000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:36 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:36 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x18, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:36 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000000)={'bond_slave_1\x00', 0x4}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r3, &(0x7f0000000140)=[{0x2, 0x0, 0x0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r4, 0xd47695450d8ce437}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r4, 0x800, 0x70bd27, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x1) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) ioctl$UDMABUF_CREATE_LIST(r7, 0x40087543, &(0x7f0000000400)={0x0, 0x1, [{0xffffffffffffffff, 0x0, 0x1000000, 0x2000}]}) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x2, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r8, 0x1, 0x1, &(0x7f0000000380)={0x3}, 0x4) sendfile(r0, r5, 0x0, 0xdd) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)={0x70, r9, 0x0, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x80000c0) sendmsg$IPVS_CMD_SET_CONFIG(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, r9, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x2044008}, 0x80008) syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3c, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r8, 0x84, 0x6b, &(0x7f0000000440)=[@in={0x2, 0x4e23, @local}], 0x10) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:24:36 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x19, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 425.660752][T27765] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:39 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:39 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = creat(&(0x7f0000000000)='./file0\x00', 0xbc) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000280)={0xb, {0x513, 0x20, 0x374, 0x2}}) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:39 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x1b, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:39 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) connect$unix(r1, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) open(0x0, 0x0, 0x0) 05:24:39 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x1c, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 428.160841][T27891] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:39 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:39 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x43, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f00000000c0)) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000040)=""/125) open(0x0, 0x0, 0x0) 05:24:39 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x1d, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:39 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x4400) renameat(r2, &(0x7f0000000280)='./file0\x00', r3, &(0x7f0000000380)='./file0\x00') [ 428.723006][T28014] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:40 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x1e, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:42 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:42 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x6) r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000080)='-nodevkeyring\\\x00', 0xf) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, 0x0, 0x300) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x22000, 0x0) open(0x0, 0x0, 0x0) 05:24:42 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x21, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:42 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) pselect6(0x40, &(0x7f0000000000)={0x39a904af, 0x0, 0x9, 0x7, 0x4, 0x80000000, 0x3f, 0xd2}, &(0x7f0000000280)={0x3, 0x7, 0x7, 0x800, 0x65d3, 0x0, 0xffffffff, 0x9a3}, &(0x7f0000000340)={0x4, 0x942, 0x9, 0x200, 0x6, 0xacad, 0x5, 0x5}, &(0x7f0000000380), &(0x7f0000000480)={&(0x7f0000000400)={0xf}, 0x8}) 05:24:42 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0x88, 0x0) 05:24:43 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:43 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000080)) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000040)=@netrom={'nr', 0x0}, 0x10) 05:24:43 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000000)={0x10000, 0x1, 0x1, 0x1ae}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xeee3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x5) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:43 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xffffffff00000088, 0x0) 05:24:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 431.979464][T28164] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:45 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:45 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xffffffffffff0088, 0x0) 05:24:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000480)=""/249, &(0x7f0000000000)=0xf9) keyctl$update(0x2, r2, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000280)=0x4) socket$rxrpc(0x21, 0x2, 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) ioctl$KDMKTONE(r6, 0x4b30, 0x56) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) 05:24:45 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x10000, 0x50680) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000080)) socket$inet_sctp(0x2, 0x5, 0x84) 05:24:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 434.332376][T28288] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:46 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:46 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = socket$caif_stream(0x25, 0x1, 0x4) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @multicast2}, 0x4, 0x4, 0x4}}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000000)="34fb9e4acab2a3524b7e8259fe", 0xd}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="f18e551ebd3fd4f34872b3f85147ce797d5eada6922cd6e21896ae089d398c701ca102afbf9bce78bb70cbbe0ccb3ed87af19176778926c18bd538489b31dee3d4c0b6df1e565cdfd3d3f17ca78c2e63712d74a33f9de98aa9053c9b71b8d9850e43d99844f7c8d6d94e8513c1a6b4b380dff1f1f72a0e8f6c4142bcd0152dba63ec87d0dc1e1e3623f0f40579917a227b3e3c4b96da998eca1086d0f863a1acaedff3", 0xa3}, {&(0x7f0000001540)="e7a283db449a42b2d1dc1ad590392f0b52416298563efa2245bfd5096c1968035398b59688481121ee2a1e79f9e6bfd40416dd1e58ac045b72d1ba5ff7a88a33e324dd21e734742eddaaa404b0be09f3141fe543186b8327ced0368a9ece57888ce62c314e920b84bc", 0x69}, {&(0x7f00000015c0)="9a5d10f48c39858277df7ebf1b4dbd9136f07cc74dda94786dbb71444011bb611f4e0068791e088302a9b57d7c1713f6de607845807546746d318cdb356cfe174e136e5582532e2f14f9dd13a28c890418980b72ea44fa067127bd4db301404ec731ac44799e04a1b6cab2d864359e", 0x6f}, {&(0x7f0000000280)="308a5732da76e7e1c0ab99afab80357945d47f59d7e2c1cabd00265adac89e45f6190edcf0e0e5aa4790baa3686d1144bb7a9638c60e", 0x36}, {&(0x7f0000001640)="cbffe6b5e7ed0dbf13da7c1f5c06400f2a258b3dff4bdd7fa69bc232fc08135ab9bd440aea08f6f7aa64dc3eb6656fe3fab270d18b6a85d0868fa9e1774be78a5562d6644f1f15ea7823b82e1e99910190e598015f379726d7cf8a17c12bcf79b7a3544d92d4684b30ad71adad3e38c1324344e207a237b4088b2323f54bbeb0120b0016df3294791ba5afaa7d226bdef8441cbc9384e2e82b11bc7f298bf48cfe", 0xa1}, {&(0x7f0000001700)="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", 0xfb}, {&(0x7f0000001800)="7aa75a61dc6a74123eedcdbc96794867f29796b14500e07ccd4d3ec0a6245bfa4ab12028277113bce97b48638053a25a7931c191fdef4799c5b8117a153f1209c4d60591847e40cd925775444c5e480c8d85bf75cea952f5e28341c23d7cf978ed9c9fe77751ce249ebe545339a416215517ae74b19ab62356113d16d45e1d8b1e1586dd096f8f007ebda643d983efed8f09ad3d14fc7bf7b4a275f1bf82cb2fb601228c2cb8df6d290ed26eceee8d2810ce600989dd85efee214838b35a9941e66499024763fcba", 0xc8}], 0x9, &(0x7f00000019c0)=ANY=[@ANYBLOB="500000000000000016010000ac090000a38228b364f6aeadebacd63d6f3ea02c8541f5763d3d47a3d4890e5f80b3fa410de091f2b415506421fe24dd88b5aa456aa98c54ea367945cad9dff200000000600000000000000008010000070000001c9db4846bfefd76ad512a7b8c7782d868a0dc525358dc2ffd37e0dec60713935fa2715963560b1895f64443db7d580e842fc5585ae779b090fc4cbce26ad04bdd7008e1bbcbc911f21dbcc4ab000000c00000000000000003010000040000005aa6d0ff46cc63b58362e6c4981435412c57eb32267200adc50ffdb23721be9c60ba7208917d285679125d5df169020db6b1ce247d01df48abe664b7056d006f0d5b974f558a29d1ee03560f52d4b6450e2ef5763a43cef109d91a068d3c7e39150743783bfb2e1caaa3624b518916479523f5f0ca84aa593ad1e73031e2740d0077cf1949c85349c3e5a8f39957714f37db0dc633f2208c0f47cc10178774fec56f3096f0052009328634e800000000"], 0x170}, 0x8000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x80) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:46 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000340)="5295d07546e7b16938", 0x9, r0) r2 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="9f5261d75b22073f23a1b57de3e27ecc6285e12a51c6ffc1968811a9aeb303835e066b0ecf1ac707881dde1be6", 0x2d, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000380)='id_resolver\x00', &(0x7f0000000500)=@chain={'key_or_keyring:', r2, ':chain\x00'}) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:46 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000000040)=""/27) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x1, 0x20) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) ioctl$TUNGETDEVNETNS(r5, 0x54e3, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0xfffffffffffffd4b) [ 435.035142][T28408] encrypted_key: insufficient parameters specified [ 435.046223][T28409] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 435.190274][T28408] encrypted_key: insufficient parameters specified 05:24:48 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:48 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = dup3(r2, 0xffffffffffffffff, 0x80000) ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000480)=ANY=[@ANYBLOB="013e5fe3f9ffffffffffaaaaaaaaaa2baa05090007f1e4f7d051d923ce83a3971e4c3db6d43180c42caa2389daf05b9aa56671e06cb85d1151debc9d769acebb5a925d2b332f22df27aa4e2d01e3c14d59fbdaf0755b8a81bf889fd079fd37bd008d3e3d0ef22cd433eb67d9db65005eac90a37b0245fb4e146f47e99115d9526e1dccf5c691d7e1a34b9e5eb880fc8e120f6fef3a06d13493cfa5aa03f8df1d8a57f4ee003725a86846706d4c56f8d04d3a44a5c9b38cb6ee4c64c2fd107c812892bf73d850d4d37f5b34bbc0832f92d5ee32cc7293fae106eddd777fcf4a24831cad1f399080"]) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:48 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x3, 0x80) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140)=0xfffffffffffffff7, 0x4) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0x80) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:24:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:48 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x183282) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) ioctl$EVIOCSREP(r5, 0x40084503, &(0x7f0000000580)=[0xffff, 0x80]) r6 = add_key$user(&(0x7f00000003c0)='\x00\x00\x00\x00\x10', &(0x7f0000000440)={'\x00\x1a\x00'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) r9 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r9) setsockopt$inet_mreqn(r9, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="010000006746e9604d7510bbe1eb666a3d", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f00000000c0)={r11}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r9, 0x84, 0xf, &(0x7f00000005c0)={r11, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r11, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000340)={r11, 0x3}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000400)={r12, 0x200}, &(0x7f0000000480)=0x8) [ 437.406691][T28528] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:49 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x5) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2000000001, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x4a, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000340)={0x5, &(0x7f0000000280)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000380)={r4, 0x10}) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r5, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:49 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:49 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_MCE_KILL(0x21, 0x0, 0x688c2b7f1b23128c) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0xc00, 0x0) clock_gettime(0x4, &(0x7f0000000100)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000000c0)={r1, r2/1000+30000}, 0x10) open(0x0, 0x0, 0x0) 05:24:49 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000480)={'team_slave_0\x00', 0x4, 0x8001}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 438.065010][T28651] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:49 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) setsockopt$inet6_dccp_buf(r2, 0x21, 0x1, &(0x7f0000000480)="bf4976f589fb3cab65582a9df7904b3d6309ce251db47da5eee23cefbb2d9fe7b9da36196797c98c61cc3957539226102c38900d954cb671f2651b54ee5c94cfafbf3ee0b4d71c2ca4a2c7eecd320266f6bd02e69af737e232c0deca8fba9198dca960557d64a37d46d74061a38437b0504794626e996e6dee3b159458bca30d3b8706718ececcf2db93e6d3aacfc7cbc808b348017b5891b18faea419e1c93f0a02503b3afbc7", 0xa7) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)={{0x71de, 0x21}, {0x5, 0x1}, 0x747, 0x6, 0x6}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sockstat\x00') keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:51 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:51 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ftruncate(r0, 0x5) 05:24:51 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:51 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000480)="559d0a49c64f0ade8cee7d3e0c994d93211544a09919a7ad0c27dd1effa69663c237664ddc73553e4fca761c42147253ea0977c2a11a3f672188e9d292d085429a60fce1943efd20e17db7586578fa6a01464cdc497c2c472706e9c23131eb1f70781f776514186725532bf830e6a4cfc7c85d576e854aeb245803684283eab9f1b5cf2e11aac6967cbfcd95fdf8b6459fb9e77f2eac72e25e1054d80b928c8a9fff2242db5af22a280e13726fa9bbd1967680290ce8e58252638751e66d1da9125f0017e31983d4c554dd15c12874a8f77963f91ac792d54081bb7165b0c7cfa57f44c2b6a37df6bfa8a1b3c4aed31a2c1824f4618e04afc8d45e1045cfaa71e31434b0f178a8b59bdecbd63345e39ad3d649dff708d3011f342727ed168d588ead5e5dc7365787193987843bd1ae7cefcf7c952b1ada520ab61cc4e6620ae7a02ca9c9c2932a752dd203657b588d2e34079a06e42114dad6a61980a5593826cb3cc3f82db496891c9694dd0dbce736902e3fda3a6fbff2b7c3a90f3e0c3aec11ec54e5b9b7360e042a1431fc72ed64ec0de791435a855284c43504aba5b800bc9443e3bbda11ca0cfb07e52448f59659c51cd6bf8049d46717c9411256639508b0de17f29949b2bca9b71a77f699563a1ff44dce540ce9f01a423aaa90d734e6d72e3b16466c349c2e4eed74cba684d28b1a3bfa98d53ed48a385b455c8b7c7a82968997ded4dcf02977e347f520f2064683cd1f5f67e3ca2f36887a40816ba1456517abeae466e8f2dff7efb9de950cd6afd9b558e8e736be53684d7bdbb1cc2a0a775d68a82c8fb2a2f46c9265a4dc8a2a21ba18eb3c660cf817fe2e85e3cb3f506156ee00a1c853e5251af3ed5a3c10dc5d12d461a3b0f9b59383a420aa6ef67b1b4e8fad0ebc2de0ec24b15f24f589aff500f81e5897eefda60181b488c4e8ef7ccf417a66cf3b1c9b7da610b94608708c5fe72139d0f6be39161068650e793c82ebd8e76e28920ffa27b6252b5e66084c9c3d846e0bbf12f99d62b08b0c0a4e06f795eb88a8beaf403260d576eece575ce78829cb45f1075a7f01564683f4cef695ecc3fe4ce8fca705002e21f3faaba3717d61263f777a5e50659f3351075d66e6a2332c38a745f7b0efe978e5053f7fdf3dbf25e7a36445a7b68983155099657c334fa890d7711717209507caf11f6b0662187000edc3e7c4160448b9103b1b9a62cd861a32e32b5de2c958b9151e476a29ef20d6f07bd33ca74c7c079a6da3946a5c7bdc387ef06432200f79ea8ca73629e2b7c5d9f2c74e2e98ff519f5371882a6e4b2a9a5378fe8fafe98f5fefd39ee31c500ce8bcc2f5b6cddcf509009e41f6703ed064d4ccf6fe47f8944e5377f1aaca9f32d1a24e0661a33717b24bc103d34c889920f10e6c8bc69c99f49b91617ce76f4ddec35be6eb61910a31b11336f95236c74dd72ba27597af0ca0cb8d76dfc12a15162a0efd689636d2d1119e3cbb301dd0f692f254eabcd95346542cbbf28b24467be1f0878823d050134055c64c725c533690d8114e3b5b0f2f8b93fe52722432c833b774a29d0f8a607ab64ada3e089a78d10bdde5090b8f3cdd5a7a014697b650ba5d6cde4d6a9e1e2cc9324e90d713b6e86b8d1a3c5852b67423fc7c52933930a1cc6b3fe4ec3a8462e90fdf55716a67ce5e59b3d3748a7bc00d897366d55823b252a684737b28dfc045c29e85e4a4f20ed6b6e21109ecd2671273a399213885f7587016a9b5ef106aa1079fb987cd13bec6ff668699c0c6a74bba222be37797c6f39021138b8488706bd3dce3b7ab6a794001f6a5a7997bbe10fa5832232c8687ee3b0bdba6284923b7655e4de9bd251052c52394f59cda1eaedbc0293bdde2f02f540476c8e4a14d4cc1a67b34e2f6bc14515cff129ea87028deef17b74e5b9010da6794bf4fdd252180c250be0c2f6f38b8a3c4900a3503eb34ac007d8015d621707d185b12eda2c4fcae2e7f3ffb486b4c5657326fdd9e0c07f173777b77fb8f21169e51a9ec1cf0574b24e26bab48b8ed0147aedd59ef684b2750555f2e4f92745efc8d85c5975a7057f981083c4f0f3470dc2c9047272b6fb2bf5bd520c64a7d025e18a35a76fb7dcf1e7659b7755c8a902523a07cb7a0cae9567e60bfda0df59766d73813372f75296e567eca0fc5823f0aa3eb735b0e4eef2cf0a0672c6ef7ced29bb19a19ff076b97028800527ded82046ff47cc0146230fd80ba5f7417b4685baba7e89c22822749c35bcef15cbb1ba10fbc7f33aec9a916c812a551a2ffb2ee09444fbba6223125df04258633857116a1601b6b9c0041ed66d4373e6da14eda96621cd440a764c9d17312072a0c2c576ba167195eb788d274fa21eccff37026a845b03364587a4ec7ae0b500cdd5d71ad81347f1b43ca7057aa9e62bc5a8a10d10f580f3a428a30eacd30392c777e698bc9621f115cb7efb0d1c399bbee82da7a4bbd115a79008ad211bd8b5365ba5bb1cf177e7277cf6358a6fb83e19c6f7c5fa70266c67f205ac1e52e1d34c1c90cf052f921c1a2dcffc679311db649f6bb3383acb91eadd4d4d1e2af3de35108d7bf6d18ad8ca3a08dcf878058c2939638f37f5e1ec7b31bb7cb937925737d3a021b714f345744ae0bc05a22c1817dcea725972dea068aac61c1328ce65299a55a87850360b6ff545452658c13c23e61183fea83d2d0fa4e2aaa8be58903913543777180cbaf00d09fa6b463425c2f83f53b0ceeb4db0432bdb46ab7353d2cf282c450b6d9115470319c223f1c2b73721cc18aa75600dd94887c861ad61a601f1b1b07134344e64307b0ffa452a9aa90d97c786c271cc08a362eac192fe61146b44a58e9c9184bed7705490d4dad69030c049deb08d6be9cb1ce03eeb371e2e41d5ab8976bb2eecf75baef35c19292be5691b5e95491189c5d0703c841522726234c7babd729d06c30a9f2a9fabbe5af207b19e4132a5cc117e787fddce352b9b9d87037ffe9b10a9a188b6d861b0be3123a2fa97ea980b2048a8b6ae844c188719299f33c39f5b79c01285ffadd216c400b229f0367229657dc53b809004542d00cbbaa973401f8cfe50afffc3d6cece0eb5f0ea24dd74a94fb75a5c0fd77d193b2bb409d7d851afbcf5abc5a35ef1afcc7140c5cfb42794f36c1a972a29c8a137ddcf6445641cbfb5db4c58878693ab57d37dc53eaa8b0157bc307ce5fd601fb7ae392cadea593ff314f98e9225638eefafb8b4e22939ab526119a192a0bdab08d391d064ca02ef35b6c66ab0efcf3b62db2c8d1ae3c1eba43ea29623810fc4a20f3d5fbb048084d2fcb9c8430d401a16e098c0550295b3f41677efc5f754161ef9297568bf9bf1abee20ade7952cf1960dbd6fd7f090bcc8046a9a248e417d36534516b21867f797ebba921323a7cbcf53e5312ea0eca897fb066424ce5f92bad24cf2ca608af65df5cac7a9d977d36506bd9724b50b8c4625e30737a786e08523a9465e7fbe20aef1d36263dcc1ff72bdfa646272ae6dc2d5c400ff3da49a282ca74c25b4f97ccb5c2d56cb103b5c9fd00aec63ea56b7586423dc819adadb127fe028b54bb4757c9de0663fee2cb3d0869976ecf1162476ae885d51615d9fc3fb0d49da293c536d8652dc58d9d289c3b358f1de4e028ab7a7643800c2d170ebe40f60cb8f243cfbae73dd20cc9ea78c38c1bf1bc3b7f36f948fa829676894cf958d3a5513ea160894fb42b66628145ffdb9b6d1527aa8e1ead967cc05d702ad2f84788eb4e7ec6bbb5083c34063aa8894f88e284bee3877c47fcfb48585dc837a0157de3573e737b28ab2128fc0674449138f989681f96ecdc398fcd565056a6876bc22356ead14fd0e54b7e5d8aa938fcb93de69aff6c965a057be7c63db1901f1be03cdec7e7058d561d305f1a55c421cddce4f2a7741f6dccd6b1f4d4c285a898e3c737745180863f7b35068e981135a050629e5043cc6e9f03dbcf767df8490615f3ea0c32a22642bac53012a0114b0dcfdf1ce3fcf881d8cf6218b1a5783179e65fafdb855f3ffebcea46e395469a94e1b56807be93c1b69ca90dc4645b5557f9974f3ab08691321dd9cf65844785a7f538ebf3c8722369df3641130f7f1ce2e70d441a06fb8459a478b3139edd9bc9f5c40a09c1b1e417414d31505a9b5e4b392b8c0b125319cc2cd04afaccd1c3a566a73e9680dbf9250a96695df607dce8c3f24982de79f7bbb2e29d6fb1327d85eacb2f226b18f8722d2f9531efdd8967dac466137e283f7b38b6648233efe43106ee066847986bd0a3032a8bc879944e74e4935886d1cbe8696d2f2b252d5e1be43380fbd7afb0fab9f3a40ee1d2a59b884b45a840600395ddcffac6a15d9f8f2e40d9c73a8ee23536940fd3946b850d691f77e998becdee8ad317e1aea527f8b88bcb2562c89d08186997f70b934825e89dfdbfd09d9925b57f754bcdcef3c3270bfa97a4980b674833b2cba4351c224988fd21cb2d9fe9f77d5edd4f440e3ac6c836f0957c3e0565d290c2d1dfd4a881e708d9c3a9eeb7230a37a913e7b7500774aac3045b4e9b62a35996f425a568f6a4499f1fcf90258b6d17af5cd2a24afeea9dd7a08b0f747c1053c842a9790571394af5dd202034a734693dbb3f666bec99a7ed90c5243ac491132cb9d30562145d2c7ae370438cf89f099fd05ab18dd7dc042a45630a5bb5bfbe86d2ac99203e3a1e514ba895fb78177e4e46de8be381224bb23f9a667e7da30dac57c0797fcc0d08c1ccc7e5ff6596af6498b63862f25bc7eb08068ba39f7ea7d967573e0ac0f0001ca6e907183d1ff82f094034988887ee408c3f3c9c0184f5f24316d408b711182c39cadbc62c794553ddf043eb02666bf9194d066f4b0f2e035581bef49976a4bb50d47bfaefabb525086b73b65deaeec76d855f8a6131cf9b05693fb0e856af5a49968d6b753108dede79cc9ba1e197111143386f5bcc81272e79b48a574305a3d224e5b4ed2f23f2a5dd736eca7c420ca6c2386181d884c4d91a8aa09778a4ba41aa91510a0f8be0fe7c786b0a53f3ac56dd954e2362fd00a7ac437580205ee2a33d1ebd3e522f6fb84f3283ec6d5c8969431bc32a0e486e2cd04566a7e736c9da7e169e35e125409c3cf17f6ed3754f5937978802902178de2c04ac4686b44dbcd4eef411cfa9cc07c573223e41ecd8cc56e4c10be22dd902aedcbce4ce2f2ea08fd4196cfc4b9650e3a6024990d852bb1bff115b3c4dd9be63fdac0b794f04b8e73b904263f1dda97c7a7680649c0684eddd936486a3c1b851915c545aaabf6406ab1409d67c9c69f92d66bce2ed54f355fdd69e27fdad13fa9c15249e03623fb02c2fedbaaad16b3cb37b528d339a1f112a4a867df2f4d17a85f455d25606b5947a5c6bb88298ab906a9115413ba9158f46f4f464a57f05a3e56f0f53f2127ce60220bc3b1159d24af7425f1df8fe6eb3b19acd921a72183154a4bc36633aaa8a78c2f7944c03ad923b32004fd5c68fffb8da2f480dde13a19f06dc9a4d59bf9dc490280c2ff2d290badc894ab0f9b1c730a3b4cf557c79a0e6b15c5d93378061515cd8893074b78d915dde2f806fc8060e52bc79a9a356c962730f5151a51aa01b65a80aa0e590f7c5f008d264580a438bdb0fe93d5835e7873b67818142f08c051bb25db5ac02ece91ae3429a36fea1a2ad99fec9c0b33e02e478d40e271ecf1b2a50e47adb9d56e69e7c90981daf4520783f1bbeff532a314df2f649846f9b0c19f63ca3fa6045", 0x1000, 0xfffffffffffffffb) prctl$PR_SET_SECUREBITS(0x1c, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 440.444147][T28770] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:51 executing program 3: get_thread_area(&(0x7f0000000380)={0x6, 0x0, 0x0, 0x7ff, 0xffffffffffffff81, 0x863, 0x2, 0x1, 0x8001, 0xff}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, 0x0, 0x0) keyctl$update(0x2, r2, 0x0, 0xfffffffffffffe6f) keyctl$setperm(0x5, r1, 0x90200) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) getsockname$unix(r4, &(0x7f0000000480)=@abs, &(0x7f0000000500)=0x6e) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) ioctl$UI_DEV_DESTROY(r6, 0x5502) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r7 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) accept4$netrom(r7, 0x0, &(0x7f0000000280)=0x10, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00', 0xb683f2a5e39e3250, 0x0) syz_open_dev$dri(&(0x7f0000000340)='/dev/dri/card#\x00', 0x9, 0x0) r8 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r8, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) get_thread_area(&(0x7f0000000400)={0x8, 0x100000, 0xffffffffffffffff, 0xeff7c8e, 0x100000000, 0x3, 0x7fffffff, 0xd885, 0x7, 0x8da}) 05:24:51 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 440.619810][T28838] encrypted_key: insufficient parameters specified [ 440.664177][T28838] encrypted_key: insufficient parameters specified [ 440.811365][T28838] encrypted_key: insufficient parameters specified [ 440.828761][T28892] encrypted_key: insufficient parameters specified 05:24:52 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xff00000000000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:52 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) select(0x40, &(0x7f0000000040)={0x1, 0x100, 0x23a, 0x4, 0xfffffffffffffff8, 0xffffffff, 0x4, 0x101}, &(0x7f0000000080)={0x9, 0xfffffffffffffff8, 0x5, 0x3, 0x101, 0x8, 0x9, 0x9}, &(0x7f00000000c0)={0xfffffffffffffffb, 0x7eb4, 0x280000, 0x4, 0xf39d000000000000, 0x20, 0x7, 0x5}, &(0x7f0000000100)={0x77359400}) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) r0 = open(0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0xbf, "ca163524ba2c25393c01bce9e3b8362a691b8d38aa451b4e0e9016683681a24dc5f4f6708717b39bde6693112a075840bf40faa5e0ff660b8f7e8636295a2df2c1d6fef231e26af662a7080d8586c7ffef2b69b4cdeee0c7ec220dc6133aa275f31e9f7eb47266f30d4c34cce7d301d1863d777d91a6911e4396d5bc8630667e0b7bf206ae7b2735963941c25ef5867bb88aaba39c1850b9b330e70fce6f6d95077e4200b368bdf264242ae4e8ebaedad3153b21e81c839733ffd969b9f5db"}, &(0x7f0000000240)=0xe3) 05:24:52 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = socket$netlink(0x10, 0x3, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000002440)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000002400)='net/l2cap\x00') sendfile(r1, r3, 0x0, 0xdd) getsockopt$inet_mreq(r3, 0x0, 0x0, &(0x7f0000000000)={@empty, @dev}, &(0x7f0000000280)=0x8) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$cont(0x18, r5, 0x0, 0x5) ptrace$cont(0x7, r5, 0x0, 0x0) process_vm_writev(r5, &(0x7f0000000d40)=[{&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f0000000580)=""/239, 0xef}, {&(0x7f0000000680)=""/250, 0xfa}, {&(0x7f0000000780)=""/188, 0xbc}, {&(0x7f0000000840)=""/198, 0xc6}, {&(0x7f0000000940)=""/227, 0xe3}, {&(0x7f0000000a40)=""/254, 0xfe}, {&(0x7f0000000b40)=""/201, 0xc9}, {&(0x7f0000000c40)=""/249, 0xf9}], 0x9, &(0x7f0000002380)=[{&(0x7f0000000e00)=""/245, 0xf5}, {&(0x7f0000000380)=""/7, 0x7}, {&(0x7f0000000f00)=""/245, 0xf5}, {&(0x7f0000001000)=""/243, 0xf3}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002100)=""/235, 0xeb}, {&(0x7f0000002200)=""/197, 0xc5}, {&(0x7f0000002300)=""/102, 0x66}], 0x8, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x5) ptrace$cont(0x7, r4, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffd0e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0xc12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) ioctl$EVIOCGNAME(r7, 0x80404506, &(0x7f0000000340)=""/64) r8 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r8, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 441.133220][T28904] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:54 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000000400)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r10, 0x0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000280)='./file0\x00', 0x1, 0x4, &(0x7f0000000700)=[{&(0x7f0000000480)="99a129d6ee6b387a8157a8ae7c6ce1c42998546cc8ab71416b75114edf58f5d4d6a86524754216808e3ae91521224e04c82c0065f8589270089496bf1daf8f9633d54530ff7c1ba920154f92f09a165ad7660b8cdbc060cc63b781a482eae37accd7ee23eb2a585a00fe5777f8b839a6b39fdcbb58bdb9d5006cd4ba70ef28f70b62f4cd08cf049f47cf507f7acf", 0x8e, 0x7}, {&(0x7f0000000340)="60831446364622525ba67673cab45ebd85db84a01d48ebc2358a903079396a5e48c83abebf5b53667de09877aa2cd0ac9f487498c342554686eb4eb1fb9244e9ca8b06b881394ab02380d175", 0x4c, 0x4}, {&(0x7f0000000540)="9152923452d625ed6bcc536ca35761dff324243616cbb89790babef6107c38ea09765f2f6dbfac8110b9908b5d4202a5db5f884c3854659171b44c5f04318fcd02cbc800dd834400aaf45a9fd0092ab75b914eace622eb516b33926b47dce7a6f455fc9a3d2d3ed7536df73acab6102ce563e79226ac49049a874f9b93243faec4bf9b3e3a3401725354924f6e7fb9225950ee958fc2a2536df74c169d9f1b4362382bf7ffcbc7960fa2c48180cf6001309ddb8fc0edbae95b1aca2ea96d1f7a2da15aff00a2bc2d35039000122169c49d5a0a3cb0f04aee3901ee00856affab27194696827eb9", 0xe7, 0x2f65}, {&(0x7f0000000640)="ed219920403d6774819544ad7af355847fe001e24b6ae21f5a0d2f8ba2402a460eec066e59484499cdd958460b9cecb4866dc3fa4c2abb19e17361f974c6e831d9d5b9aca0d15e879274d74ba9f62bea2d9cd625d90797af946778b5a2f1a0039c53a86e95d6c91bee94c8aada2b13d7f08318cf485c05a648441016832899247b35d8", 0x83, 0x5}], 0x6, &(0x7f00000009c0)=ANY=[@ANYBLOB='data=ordered,commit=0x0000000000000006,rgrplvb,discard,norecovery,fowner<', @ANYRESDEC=r1, @ANYBLOB=',obj_role=user\x00,fowner<', @ANYRESDEC=r3, @ANYBLOB="2c736d61636b667368a58e591bcf5da2884cab725cdbd9dfadf8069cadfb26787273797a2c7375626a5b75", @ANYRESDEC=r8, @ANYBLOB=',euid>', @ANYRESDEC=r10, @ANYBLOB=',subj_user=user\x00,subj_type=syz,\x00']) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r11 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r11, 0x0, 0x0) r12 = add_key(&(0x7f0000000b40)='big_key\x00', &(0x7f0000000b80)={'syz', 0x3}, &(0x7f0000000bc0)="0653e15dde2d6fdee31025c93d5577f1c10b46a8b29e62b440703d8bad877e8411c00d7d6e18ebc665d5cb2538fc0424d420a147c34a1917286a1a41665d00519839f11261ad17798a5f3744a202e7257ac1bc166685d0c91823a566754e109aa60e15aa9d704db521dd6dfac502612b4e0a1605856b6c0946ef65d296de1415118973dee79b015ab1c82ae07e72da736a9fd3bb4589bc1152fe63ff34a3941979f6f7f59c210f9ca8c68382a078f0f33db8c4b50c97b6e253615d3c71254230d8e9bf7f3463432dfc7ad71e18e8de6c24fb64865302a9e62115f5f29aca579dc82f7df5", 0xe4, r11) r13 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000b00)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, r12) keyctl$update(0x2, r13, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r14 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r13, r14, r13}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0}, &(0x7f00000008c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r17, 0x0) lstat(&(0x7f0000000900)='./file0\x00', &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r15, r17, r18) 05:24:54 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000280)=0x4) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r3 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r2, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x4e24, @multicast2}}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r4, r2}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:54 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000400)={0x4}, 0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x4640c1, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r5 = getpid() sched_setparam(r5, &(0x7f00000003c0)=0x3) sendfile(r3, r4, 0x0, 0xdd) r6 = syz_open_dev$admmidi(&(0x7f0000000440)='/dev/admmidi#\x00', 0x7, 0x40800) sendmsg$nl_netfilter(r6, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x140, 0x13, 0x8, 0x10, 0x70bd26, 0x25dfdbfb, {0xa, 0x0, 0x9}, [@generic="b836192e8006dabe577072312913c3bad77015ecd77cdad51bfaa6fd823f68d9fc816cd38a5e641e872f7e11e153e2600dd9a660637a11bcc603291f6894e5be3a0166319d707bb69b9c7eff56d8ee8f2e9a6c971be73b9e8d709b370a4f09c2255be6433840dad8e09d3cd7863e2f45fa290d36eb5c99f41b4de28a6b893f29e5cd389d54bbed8b8607597e0cb22e55ec0a6873f6779013c6835f9ee6b759479b64b088e377d82d771c1f27de1e258e247fe2a0f5d0abae32d6011f4013257daf2f145b5f0bd8e635f79a79289cc5a0a1de284246fe792cfc2b64024373e65a12cd4656441ad40669344aaa06e70e1061", @typed={0x1c, 0x68, @str='net/ip_tables_targets\x00'}, @typed={0x1c, 0x80, @str='net/ip_tables_targets\x00'}]}, 0x140}}, 0x1040) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x9) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) fcntl$getownex(r8, 0x10, &(0x7f0000000040)) r9 = socket$netlink(0x10, 0x3, 0x9) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r9, r10, 0x0, 0xdd) setsockopt$SO_TIMESTAMPING(r10, 0x1, 0x25, &(0x7f0000000080)=0x353c, 0xfffffffffffffe1b) 05:24:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 443.533318][T29017] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 443.558503][T29020] encrypted_key: insufficient parameters specified [ 443.617827][T29036] encrypted_key: insufficient parameters specified 05:24:54 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:55 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') ioctl$SIOCAX25OPTRT(r3, 0x89e7, &(0x7f0000000380)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x20}) sendfile(r2, r3, 0x0, 0xdd) getpeername$llc(r3, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000280)=0x10) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:55 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vcs\x00', 0xe8e76d9e4524b4e0, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000001100)) clone(0x2006fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000001040)={0x0, 0x1000, &(0x7f0000000040)="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"}) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) setsockopt$inet_dccp_int(r2, 0x21, 0x5, &(0x7f0000001080)=0x8, 0x4) 05:24:55 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:55 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x5) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = dup(r3) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0xebce, 0x7, 0x8, 0x0, 0x0, 0x7fffffff, 0x8020, 0x1, 0xc7e4, 0x0, 0x5, 0x8, 0x8001, 0x0, 0x8, 0x8, 0x3, 0x9, 0x3, 0x5, 0x7fff, 0x400, 0xffffffff, 0x9, 0x3, 0x8, 0xea47, 0xc24, 0x1f, 0x101, 0xbf, 0x80000001, 0x8, 0x8, 0x8a, 0xfffffffffffffffa, 0x0, 0x3, 0x8, @perf_bp={&(0x7f0000000000), 0x2}, 0x20000, 0x0, 0x9, 0x8, 0x1f, 0x800, 0x6}, r1, 0x9, r4, 0x4) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r5, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:55 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:55 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, 0x0, 0x0) r3 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, r2) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x208041, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/llc\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f0000000640)={r5, 0x18ffcb7f}) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r3}, &(0x7f0000000480)=""/215, 0xd7, &(0x7f0000000340)={&(0x7f0000000280)={'streebog512\x00'}, &(0x7f0000000580)="87602a80b075cc692003f70b386f906bea61e5e61a0439a9b8c274fe5442aab7931f9c5286db44e5e00f415e855a74f197d86511afbfb92f9d65727a11c544051aa7f49e6b37632f57c203d031e1ab42d655ce2a4d39e86221472d74907fabc2333ee4aa9fa1c4587849f771d76eba2c810bc9d3e2a6e3285129e5b853f52d7ea6f31799951e555d18f0c1c063f5ac81844196ee9dc8a232c265fc0da35ba99b49e052a626db6c201ba9cbc766d752c20ff5c2dbb1b8db09f854d3f74c", 0xbd}) gettid() fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000680)='security.ima\x00', &(0x7f00000006c0)=@v2={0x5, 0x2, 0x7, 0x80000000, 0xf4, "d23ab7f8b6842a213449d1a49bb168a32629877e0e405ff75810c3e9049a66a81c5fa16878c85eecc24cc84e90ad27e361cd0b07a987f3d8ec913e3220e5c75df153cb78d4d0f47752bbba211fe00141aeb39b9d598adb55d61e5584e24dadb141480d34b9f51f62790d21d6a9bd70970fc5cdd3a57cb63a3ea631146222ad3bd37c90721d9fad026ff28edcda8d4f192274568e72adfe6e331b5eba7d66305a2547b7172b4b238dae20442bc89ffc819e0ac4cbaec0091f622b17699e9e6a4842cd0540a9d0734a1c3b893036ebea06f86ea7bc38ee6d7f08e7b144dcd479fca82a029b931e4bda309bb3b04c1cb4ffd2f7d1ba"}, 0xfe, 0x2) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 444.227005][T29153] encrypted_key: insufficient parameters specified 05:24:55 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) sync() perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:55 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) [ 444.352146][T29171] encrypted_key: insufficient parameters specified 05:24:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a05d, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:55 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) accept$inet(r3, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000280)=0x10) 05:24:55 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x4, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0xa24df5d8}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000000}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000280)=0x14) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:55 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) pwrite64(r0, &(0x7f0000000040)="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", 0x1000, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) [ 444.685615][T29285] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program 05:24:56 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 05:24:56 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) connect$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2, 0x6dca}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r2}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'%ebug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:56 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) [ 444.995493][T29403] EXT4-fs (sda1): Unrecognized mount option "%ebug_want_extra_isize=0x0000000000001000" or missing value [ 445.177780][T29415] EXT4-fs (sda1): Unrecognized mount option "%ebug_want_extra_isize=0x0000000000001000" or missing value 05:24:58 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000000)) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:58 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000080)=0x1, 0x4) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x0, 0x0) 05:24:58 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x62, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffff7fffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:58 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2, 0x9}, 0x1c) 05:24:58 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:24:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'\\ebug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 447.319313][T29426] EXT4-fs (sda1): Unrecognized mount option "\ebug_want_extra_isize=0x0000000000001000" or missing value 05:24:58 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x2, 0x0, [{}, {}, {}, {0x0, 0x800000000000}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000280)=0x5, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:58 executing program 5: 05:24:58 executing program 5: [ 447.501107][T29426] EXT4-fs (sda1): Unrecognized mount option "\ebug_want_extra_isize=0x0000000000001000" or missing value 05:24:58 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3f, 0x0) clone(0x2007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xa1f40001) open(0x0, 0x80001, 0x80) 05:24:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'d%bug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:24:58 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800020}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r3, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x800}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7d50}]}, 0x40}, 0x1, 0x0, 0x0, 0x42000}, 0x8000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:24:59 executing program 5: [ 447.704489][T29549] futex_wake_op: syz-executor.4 tries to shift op by -192; fix this program [ 447.791148][T29555] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x0000000000001000" or missing value 05:24:59 executing program 5: [ 447.958237][T29648] EXT4-fs (sda1): Unrecognized mount option "d%bug_want_extra_isize=0x0000000000001000" or missing value 05:24:59 executing program 5: 05:24:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'d\\bug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 448.248345][T29678] EXT4-fs (sda1): Unrecognized mount option "d\bug_want_extra_isize=0x0000000000001000" or missing value [ 448.348664][T29684] EXT4-fs (sda1): Unrecognized mount option "d\bug_want_extra_isize=0x0000000000001000" or missing value 05:25:01 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {0x0, 0xfff}]}}}) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000700)=0x20, 0x4) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000240)="db40951195b6532950", 0x9) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000400)={0x101ff, 0x3, 0xf000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) ptrace$cont(0x18, r3, 0x0, 0x5) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) fsetxattr$trusted_overlay_upper(r6, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="0013c800201178df987cea08dc11ed4840ab22c2ffb3f4cf379793e08846b272f8d98fe8ed5da280b743ee7b31223f589ee6f14db2a3b05ffa42f0ec7220da68efab5c548edb96d6bcd937c6ea2bd305d6e626945dec4241b3d1b2ae770421d668e360947d0ec9b40f1e2fffc85bdcda71c79b040fe1d4dc8844b43337da066003d565d382d583f7e1fa3d07818380cf24736d37d3fd1c8343ef407277e005ad164eca31867c829590a78aa267598b461ace0000b5e3cb39fe3e24ed3bbfd84c528513dd697aac568c643385654a3177414bca233b0004955a5da8a39014a14800000000bd630000"], 0xc7, 0x1d0e3750d00dd012) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$cont(0x18, r7, 0x0, 0x5) ptrace$cont(0x7, r7, 0x0, 0x0) r8 = gettid() ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x3c) ptrace$cont(0x18, r8, 0x0, 0x0) ptrace$cont(0x18, r8, 0x0, 0x5) ptrace$cont(0x7, r8, 0x0, 0x0) ptrace$cont(0x18, r8, 0x0, 0x1) socket$inet6(0xa, 0x0, 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000740)='/dev/full\x00', 0x400, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000780)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000880)=0xffffffffffffff96) sendmsg$xdp(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000300)={0x2c, 0x4, r10, 0x14}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000340)="f37592b82765c44a702bc5170f6b382db93b64a2a00e487ebcf6ec3587a30d3d3f8cadfbfdea4dbf8c41c59c1b41d0745b04fb1f7a88ffc8b7cca910fdd2fd9961bf3c4b68bda85238ee8be9bb511dedd84a6b1dcf4d1d01608ef3221414d5cd4c94417863efaba09e18347858ce919a97c761c4e2c46cf140a9872d72f46fe1e3e7f8cdf3667ac3e0017a79a5331170cdeb62406872ccd4a4710458cae93c042d0c242d86ed6e4361c05fc3c445c40cd6020e6c66ebb566654797d42ee19645fdca6b3c254f988d3f36f279e0f17ae09624d5fda31931cef0b33526db87a8935ce70522ff", 0xe5}, {&(0x7f0000000440)="d34685bcc28ad1530bbdc97f93e81debf4f365dbd5eb92de9db0755c6a01d5fb89dbe28a376fdb51aba243e9439432e1a103ae5b3ef61eea13c1133157588b4f8d8beec6df0af197455694376fe27dd97d1c7559cb3fe9109b0a10cb4c65bb6e7fcb730e343bc59ddac231593f1c8c160499f4f23a604c950635292d9bda0a7c5e2cf788f1cb78c96efc4789d9eedd812f0e5f74642930bf396f3554cfd1ee9915ffbd272aa53a447fcbc162d3", 0xad}, {&(0x7f0000000500)="cfa23a7f70c44b20902bfd2b0850368e18a2f80d3118ac3cdf72da19bd2783534a39b30d28386d02c49bd9822fab4816d36292785143b2b6b7a6cfc355cae7a839e542360355b4d14185a40e1998fcb8a77f00b9754ebf572dfd411dc299d918bb409174a3960d77664b4d28911439f1a08cbfa448fef905f866fa31d9b15fc52e29a1f6c64cfe452a36c3c006e275fbab564154ff2bfd061802afe9184bc95ffcbf96eb9f0c6d9ca8d17bdaabde2796f5197e75fe5c6a7eea2f5107b0a52f0e05f2b71260a220b9", 0xc8}, {&(0x7f0000000600)="58be0366fc42c9b0045e738e06d06ad8ca3ce459c7724a627e2bfe09b7561bf8447326ad6ac3f4aa7bb6359e8bc3348fb0dccf9aa666be10bbfa273e9b04bb17291f7ce0abb75b8bf6d08eb1246afc49cc792652971d0cc40d2206e6f8d121ea3d0968c7216c7eb10bdbb9d204ca255fbb469b9d88bf5b90056c", 0x7a}], 0x4}, 0x40) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer2\x00', 0x80, 0x0) bind$xdp(0xffffffffffffffff, &(0x7f00000004c0)={0x2c, 0x4, r10, 0x13, r11}, 0x10) r12 = socket$netlink(0x10, 0x3, 0x9) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r13 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r12, r13, 0x0, 0xdd) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0xcb, 0x3, 0xfffffffffffffffb, 0x8, 0x0, 0x7ff, 0x406, 0x4, 0x8, 0x8, 0x49b1, 0x1, 0x7, 0x7, 0x6, 0x0, 0x6, 0x3, 0x8, 0x1, 0x7fff, 0x100000000, 0x8, 0xfffffffffffffffa, 0x8, 0x80000000, 0x0, 0xc8ca, 0x6, 0x2, 0x5, 0xfffffffffffffff8, 0x20, 0x9, 0xff, 0x3, 0x0, 0x400, 0x0, @perf_config_ext={0x9, 0xffffffff80000001}, 0x100, 0xffff, 0x9, 0x1, 0x1000, 0x200, 0xffffffff}, r3, 0xb, r13, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r14 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r14, r2}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:01 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:01 executing program 5: pipe(&(0x7f0000000040)) clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) pipe(&(0x7f0000000100)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="4034ccd3d2bb01002120146e0f34"], 0xe}}, 0x0) pipe(&(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 05:25:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'de%ug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:01 executing program 4: 05:25:01 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x2}, {}, {}, {}, {}, {}, {0x6}]}}}) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r4) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="857577941c5dc70f462cac925c99d6b3604a7d66bbafc10cc6cc14d0cfa51158f0901d4bfb06d45c14d7959cedaed36778d239ce85abb959cfc816892399f8e54b3d7e5a2766fe9a147984290b66b3b40b46c26386f37dda25e997cc4ce5e9782431b146128c0fe3b3ad68dc8e098361dbdc495ffe3d02222d46a7d379bf29c8a8c76dc84b7ad9783b0e517943beae4433691108f6f2c4586213c22587c947c218f84093bc5a346fbad7417545b649eba71f0f732acea0cac3d64f88753618ff71c5e6ce552f332e9f433941980316de35b053338f6f33e0099cae542aad2acc54901d", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000005c0)={r6, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r6, 0x40, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000280)={r6, 0x1d1a}, 0x8) r7 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r7) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) r9 = socket$netlink(0x10, 0x3, 0x9) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r9, r10, 0x0, 0xdd) dup2(r10, r0) r11 = socket$netlink(0x10, 0x3, 0x9) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r11, r12, 0x0, 0xdd) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000580)=ANY=[], &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r13 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r13) setsockopt$inet_mreqn(r13, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r14 = socket$inet6_sctp(0xa, 0x5, 0x84) r15 = socket$netlink(0x10, 0x3, 0x9) r16 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r15, r16, 0x0, 0xdd) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r16, 0x84, 0x1d, &(0x7f0000000880)=ANY=[@ANYBLOB="01100000ff19641700733fddc813686448eeea707bfcb2f07582439b5ecb9098193d951356509841973332023da1813700d9293048831d6cfb61a5c616cc0abbf14702da94c8fd1aa03cf74017207e44de4349a7937906865f8b3e290c662f640e346847a002b366bee52673660247e4c419d4d6dbbbd4e392354772ca375f05d1b266bdd83fa6c55e0ed662c8fd6b0c9839cdb5b677fa23e35308eb6a68e296907e94e886e49596deb0a7d0d6083dceabeaa702dfe0f1c45b9202e6ac3274bb157d26cc510fd1070944d7b33eb0bbf016ff86cd3e3522686b1f5cb094a2000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r14, 0x84, 0x1, &(0x7f00000000c0)={r17, 0x0, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000100)=0xfffffffffffffdd1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r13, 0x84, 0xf, &(0x7f00000005c0)={r17, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000840)={r17, 0xfffffffffffffffa, 0x30}, &(0x7f0000000040)=0xc) r18 = socket$netlink(0x10, 0x3, 0x9) r19 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r18, r19, 0x0, 0xdd) r20 = socket$netlink(0x10, 0x3, 0x9) r21 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r20, r21, 0x0, 0xdd) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r21, 0x84, 0x18, &(0x7f00000007c0)={0x0}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r19, 0x84, 0xf, &(0x7f00000005c0)={r22, @in={{0x2, 0x4e22, @broadcast}}, 0x9a5f, 0x7fff, 0x8e6, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x40, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000), 0x4) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r23 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r23, 0x0, 0x0) keyctl$update(0x2, r23, 0x0, 0x0) r24 = add_key(&(0x7f0000000400)='blacklist\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r25 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="bf1e6f2fb0c1393838f470dae962bf61062decb326aecacceeb0a9d802806cb819955dfdb144675df31bc57b5240080c5aa7ca", 0x33, r24) keyctl$dh_compute(0x17, &(0x7f0000000380)={r25}, &(0x7f00000000c0)=""/83, 0x188, 0x0) 05:25:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r0, r1, 0x0) 05:25:01 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 05:25:01 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'\x06\x00\xab', 0x3}, &(0x7f0000000500)="f57b75d7211f92f2fd0e419b81b8b525bf6a0b93d02c09879dd317a761b41de97ab81f09762c494193d837e72aa0a3a1bf708028bdfdba156f52d0793eb73f25f16f39db2ca5845519ad2bea7f1112109817f959083ff7c74ee0ce39ddac41fcc80cd6", 0x63, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000280)={0x1, 0x22a, 0x9}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 450.542997][T29700] EXT4-fs (sda1): Unrecognized mount option "de%ug_want_extra_isize=0x0000000000001000" or missing value [ 450.690245][T29695] encrypted_key: insufficient parameters specified [ 450.707845][T29695] encrypted_key: insufficient parameters specified 05:25:02 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='\x13\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000000)="9fbea7a11949820633902dbb24902811ba54cde8", 0x14, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 450.740052][T29718] EXT4-fs (sda1): Unrecognized mount option "de%ug_want_extra_isize=0x0000000000001000" or missing value 05:25:02 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x229, 0x20000000cd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='cpu&5\n\n\n&\x00\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') 05:25:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'deb#g_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 450.825366][T29746] encrypted_key: insufficient parameters specified [ 450.859959][T29695] encrypted_key: insufficient parameters specified 05:25:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'batadv0\x00', &(0x7f0000002fc0)=ANY=[@ANYBLOB="03"]}) [ 451.082422][T29838] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x0000000000001000" or missing value [ 451.201045][T29944] EXT4-fs (sda1): Unrecognized mount option "deb#g_want_extra_isize=0x0000000000001000" or missing value 05:25:04 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:04 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:04 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) getsockopt$MISDN_TIME_STAMP(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000280), &(0x7f0000000400)=0x4) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000340)={[{0x8, 0x2, 0xe54, 0x5, 0x20, 0x8000, 0x392, 0x459a, 0x1ff, 0xc123, 0xc0af, 0x6, 0x9}, {0x1, 0xfffffffffffffff8, 0x6, 0x3, 0xffffffff, 0x80, 0x1864, 0x6, 0x5, 0x1, 0x13, 0x6}, {0x4, 0x84, 0x1d, 0x3ff, 0x0, 0xffff, 0x1, 0xfffffffffffffffd, 0x1, 0xfffffffffffffffb, 0x81, 0x80, 0x2}], 0x100}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f0000000000)={0x1000, 0x0, 0x400, 0x3f, 0x3, @stepwise={{0x3, 0x401}, {0x7, 0x5}, {0x6, 0x8}}}) 05:25:04 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, 0x0, 0x0) r3 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, r2) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x208041, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/llc\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f0000000640)={r5, 0x18ffcb7f}) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r3}, &(0x7f0000000480)=""/215, 0xd7, &(0x7f0000000340)={&(0x7f0000000280)={'streebog512\x00'}, &(0x7f0000000580)="87602a80b075cc692003f70b386f906bea61e5e61a0439a9b8c274fe5442aab7931f9c5286db44e5e00f415e855a74f197d86511afbfb92f9d65727a11c544051aa7f49e6b37632f57c203d031e1ab42d655ce2a4d39e86221472d74907fabc2333ee4aa9fa1c4587849f771d76eba2c810bc9d3e2a6e3285129e5b853f52d7ea6f31799951e555d18f0c1c063f5ac81844196ee9dc8a232c265fc0da35ba99b49e052a626db6c201ba9cbc766d752c20ff5c2dbb1b8db09f854d3f74c", 0xbd}) gettid() fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000680)='security.ima\x00', &(0x7f00000006c0)=@v2={0x5, 0x2, 0x7, 0x80000000, 0xf4, "d23ab7f8b6842a213449d1a49bb168a32629877e0e405ff75810c3e9049a66a81c5fa16878c85eecc24cc84e90ad27e361cd0b07a987f3d8ec913e3220e5c75df153cb78d4d0f47752bbba211fe00141aeb39b9d598adb55d61e5584e24dadb141480d34b9f51f62790d21d6a9bd70970fc5cdd3a57cb63a3ea631146222ad3bd37c90721d9fad026ff28edcda8d4f192274568e72adfe6e331b5eba7d66305a2547b7172b4b238dae20442bc89ffc819e0ac4cbaec0091f622b17699e9e6a4842cd0540a9d0734a1c3b893036ebea06f86ea7bc38ee6d7f08e7b144dcd479fca82a029b931e4bda309bb3b04c1cb4ffd2f7d1ba"}, 0xfe, 0x2) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:04 executing program 4: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x2}, {}, {}, {}, {}, {}, {0x6}]}}}) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r4) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="857577941c5dc70f462cac925c99d6b3604a7d66bbafc10cc6cc14d0cfa51158f0901d4bfb06d45c14d7959cedaed36778d239ce85abb959cfc816892399f8e54b3d7e5a2766fe9a147984290b66b3b40b46c26386f37dda25e997cc4ce5e9782431b146128c0fe3b3ad68dc8e098361dbdc495ffe3d02222d46a7d379bf29c8a8c76dc84b7ad9783b0e517943beae4433691108f6f2c4586213c22587c947c218f84093bc5a346fbad7417545b649eba71f0f732acea0cac3d64f88753618ff71c5e6ce552f332e9f433941980316de35b053338f6f33e0099cae542aad2acc54901d", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000005c0)={r6, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r6, 0x40, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000280)={r6, 0x1d1a}, 0x8) r7 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r7) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) r9 = socket$netlink(0x10, 0x3, 0x9) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r9, r10, 0x0, 0xdd) dup2(r10, r0) r11 = socket$netlink(0x10, 0x3, 0x9) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r11, r12, 0x0, 0xdd) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000580)=ANY=[], &(0x7f000095dffc)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r13 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r13) setsockopt$inet_mreqn(r13, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r14 = socket$inet6_sctp(0xa, 0x5, 0x84) r15 = socket$netlink(0x10, 0x3, 0x9) r16 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r15, r16, 0x0, 0xdd) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r16, 0x84, 0x1d, &(0x7f0000000880)=ANY=[@ANYBLOB="01100000ff19641700733fddc813686448eeea707bfcb2f07582439b5ecb9098193d951356509841973332023da1813700d9293048831d6cfb61a5c616cc0abbf14702da94c8fd1aa03cf74017207e44de4349a7937906865f8b3e290c662f640e346847a002b366bee52673660247e4c419d4d6dbbbd4e392354772ca375f05d1b266bdd83fa6c55e0ed662c8fd6b0c9839cdb5b677fa23e35308eb6a68e296907e94e886e49596deb0a7d0d6083dceabeaa702dfe0f1c45b9202e6ac3274bb157d26cc510fd1070944d7b33eb0bbf016ff86cd3e3522686b1f5cb094a2000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r14, 0x84, 0x1, &(0x7f00000000c0)={r17, 0x0, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000100)=0xfffffffffffffdd1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r13, 0x84, 0xf, &(0x7f00000005c0)={r17, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000840)={r17, 0xfffffffffffffffa, 0x30}, &(0x7f0000000040)=0xc) r18 = socket$netlink(0x10, 0x3, 0x9) r19 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r18, r19, 0x0, 0xdd) r20 = socket$netlink(0x10, 0x3, 0x9) r21 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r20, r21, 0x0, 0xdd) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r21, 0x84, 0x18, &(0x7f00000007c0)={0x0}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r19, 0x84, 0xf, &(0x7f00000005c0)={r22, @in={{0x2, 0x4e22, @broadcast}}, 0x9a5f, 0x7fff, 0x8e6, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x40, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000), 0x4) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r23 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r23, 0x0, 0x0) keyctl$update(0x2, r23, 0x0, 0x0) r24 = add_key(&(0x7f0000000400)='blacklist\x00', &(0x7f0000000480)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) r25 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="bf1e6f2fb0c1393838f470dae962bf61062decb326aecacceeb0a9d802806cb819955dfdb144675df31bc57b5240080c5aa7ca", 0x33, r24) keyctl$dh_compute(0x17, &(0x7f0000000380)={r25}, &(0x7f00000000c0)=""/83, 0x188, 0x0) 05:25:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'deb%g_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 453.484737][T29955] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000001000" or missing value [ 453.504703][T29957] encrypted_key: insufficient parameters specified 05:25:04 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {0x4000000000000000}, {}, {}, {0xfffffffffffffffd}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) fcntl$addseals(r1, 0x409, 0x5) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$KVM_X86_SET_MCE(r4, 0x4040ae9e, &(0x7f0000000000)={0x0, 0xd000, 0x8000, 0x4, 0x7}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x142000) ioctl$SIOCX25GCALLUSERDATA(r5, 0x89e4, &(0x7f0000000480)={0x7a, "cf5335c16b4c3663c2a9a7e534981ee1487f1c0eb3e12d32c78fff471c001f4d0c9a4a301ecc32af90e4e2edb32e97c9652b94f8af2e41a7a0c0ec222663356ed97bb18e9b0dc975971053a7877583b6e273e6198b83a671f5e1d381f103a8a5be4844853c47c4254ad680c790e6d97211f169d6417e8450fd94009257df5342"}) ioctl$SCSI_IOCTL_GET_IDLUN(r4, 0x5382, &(0x7f0000000280)) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) ioctl$SCSI_IOCTL_GET_IDLUN(r8, 0x5382, &(0x7f0000000380)) [ 453.628722][T29968] EXT4-fs (sda1): Unrecognized mount option "deb%g_want_extra_isize=0x0000000000001000" or missing value 05:25:04 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, 0x0, 0x0) r3 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, r2) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x208041, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/llc\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f0000000640)={r5, 0x18ffcb7f}) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r3}, &(0x7f0000000480)=""/215, 0xd7, &(0x7f0000000340)={&(0x7f0000000280)={'streebog512\x00'}, &(0x7f0000000580)="87602a80b075cc692003f70b386f906bea61e5e61a0439a9b8c274fe5442aab7931f9c5286db44e5e00f415e855a74f197d86511afbfb92f9d65727a11c544051aa7f49e6b37632f57c203d031e1ab42d655ce2a4d39e86221472d74907fabc2333ee4aa9fa1c4587849f771d76eba2c810bc9d3e2a6e3285129e5b853f52d7ea6f31799951e555d18f0c1c063f5ac81844196ee9dc8a232c265fc0da35ba99b49e052a626db6c201ba9cbc766d752c20ff5c2dbb1b8db09f854d3f74c", 0xbd}) gettid() fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000680)='security.ima\x00', &(0x7f00000006c0)=@v2={0x5, 0x2, 0x7, 0x80000000, 0xf4, "d23ab7f8b6842a213449d1a49bb168a32629877e0e405ff75810c3e9049a66a81c5fa16878c85eecc24cc84e90ad27e361cd0b07a987f3d8ec913e3220e5c75df153cb78d4d0f47752bbba211fe00141aeb39b9d598adb55d61e5584e24dadb141480d34b9f51f62790d21d6a9bd70970fc5cdd3a57cb63a3ea631146222ad3bd37c90721d9fad026ff28edcda8d4f192274568e72adfe6e331b5eba7d66305a2547b7172b4b238dae20442bc89ffc819e0ac4cbaec0091f622b17699e9e6a4842cd0540a9d0734a1c3b893036ebea06f86ea7bc38ee6d7f08e7b144dcd479fca82a029b931e4bda309bb3b04c1cb4ffd2f7d1ba"}, 0xfe, 0x2) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:05 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x29000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'deb*g_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 453.907474][T29990] encrypted_key: insufficient parameters specified 05:25:05 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 453.965877][T30006] EXT4-fs (sda1): Unrecognized mount option "deb*g_want_extra_isize=0x0000000000001000" or missing value [ 454.130839][T30097] EXT4-fs (sda1): Unrecognized mount option "deb*g_want_extra_isize=0x0000000000001000" or missing value 05:25:07 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, 0x0, 0x0) r3 = add_key(&(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, r2) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x208041, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/llc\x00') ioctl$sock_bt_cmtp_CMTPCONNADD(r4, 0x400443c8, &(0x7f0000000640)={r5, 0x18ffcb7f}) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r3}, &(0x7f0000000480)=""/215, 0xd7, &(0x7f0000000340)={&(0x7f0000000280)={'streebog512\x00'}, &(0x7f0000000580)="87602a80b075cc692003f70b386f906bea61e5e61a0439a9b8c274fe5442aab7931f9c5286db44e5e00f415e855a74f197d86511afbfb92f9d65727a11c544051aa7f49e6b37632f57c203d031e1ab42d655ce2a4d39e86221472d74907fabc2333ee4aa9fa1c4587849f771d76eba2c810bc9d3e2a6e3285129e5b853f52d7ea6f31799951e555d18f0c1c063f5ac81844196ee9dc8a232c265fc0da35ba99b49e052a626db6c201ba9cbc766d752c20ff5c2dbb1b8db09f854d3f74c", 0xbd}) gettid() fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000680)='security.ima\x00', &(0x7f00000006c0)=@v2={0x5, 0x2, 0x7, 0x80000000, 0xf4, "d23ab7f8b6842a213449d1a49bb168a32629877e0e405ff75810c3e9049a66a81c5fa16878c85eecc24cc84e90ad27e361cd0b07a987f3d8ec913e3220e5c75df153cb78d4d0f47752bbba211fe00141aeb39b9d598adb55d61e5584e24dadb141480d34b9f51f62790d21d6a9bd70970fc5cdd3a57cb63a3ea631146222ad3bd37c90721d9fad026ff28edcda8d4f192274568e72adfe6e331b5eba7d66305a2547b7172b4b238dae20442bc89ffc819e0ac4cbaec0091f622b17699e9e6a4842cd0540a9d0734a1c3b893036ebea06f86ea7bc38ee6d7f08e7b144dcd479fca82a029b931e4bda309bb3b04c1cb4ffd2f7d1ba"}, 0xfe, 0x2) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:07 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, 0x2}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:07 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'deb+g_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:07 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 456.611836][T30122] encrypted_key: insufficient parameters specified [ 456.631871][T30120] EXT4-fs (sda1): Unrecognized mount option "deb+g_want_extra_isize=0x0000000000001000" or missing value [ 456.663462][T30119] Unknown ioctl 9221 05:25:07 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:08 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 456.819512][T30131] EXT4-fs (sda1): Unrecognized mount option "deb+g_want_extra_isize=0x0000000000001000" or missing value 05:25:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:08 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x150d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf897, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'deb-g_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:08 executing program 3: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x40a480) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000180)={0x0, 'bond0\x00'}, 0x18) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:08 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {0x4000000000000000}, {}, {}, {0xfffffffffffffffd}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) fcntl$addseals(r1, 0x409, 0x5) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$KVM_X86_SET_MCE(r4, 0x4040ae9e, &(0x7f0000000000)={0x0, 0xd000, 0x8000, 0x4, 0x7}) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x142000) ioctl$SIOCX25GCALLUSERDATA(r5, 0x89e4, &(0x7f0000000480)={0x7a, "cf5335c16b4c3663c2a9a7e534981ee1487f1c0eb3e12d32c78fff471c001f4d0c9a4a301ecc32af90e4e2edb32e97c9652b94f8af2e41a7a0c0ec222663356ed97bb18e9b0dc975971053a7877583b6e273e6198b83a671f5e1d381f103a8a5be4844853c47c4254ad680c790e6d97211f169d6417e8450fd94009257df5342"}) ioctl$SCSI_IOCTL_GET_IDLUN(r4, 0x5382, &(0x7f0000000280)) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) ioctl$SCSI_IOCTL_GET_IDLUN(r8, 0x5382, &(0x7f0000000380)) 05:25:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 457.330303][T30160] EXT4-fs (sda1): Unrecognized mount option "deb-g_want_extra_isize=0x0000000000001000" or missing value [ 457.578444][T30174] EXT4-fs (sda1): Unrecognized mount option "deb-g_want_extra_isize=0x0000000000001000" or missing value 05:25:10 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:10 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:10 executing program 3: lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='security.capability\x00', &(0x7f0000000480)=@v2={0x2000000, [{0x7, 0xffffffffffffffff}, {0x0, 0x8}]}, 0x14, 0x3) remap_file_pages(&(0x7f0000ff3000/0xb000)=nil, 0xb000, 0x2000000, 0x7, 0x20000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x1, 0x3f}, &(0x7f0000000500)=0x10) r5 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r5) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000006c0)=ANY=[@ANYBLOB="0101000054a1bdc6bc6ed628b2266ba757b13db39fb5586fb3000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000000c0)={r7}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000005c0)={r7, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r7, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000005c0)={r7}, &(0x7f0000000600)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000540)={r4, 0x400, 0x1, 0x26fe1bc}, &(0x7f0000000580)=0x10) r8 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_FBUF(r8, 0x4030560b, &(0x7f0000000340)={0x0, 0x62, &(0x7f0000000280)="e1b2be8663e720a7bdb990c4819dfb1c0db32d4083feb18fd188416325b85a", {0x3, 0x9, 0x252a4a74, 0x4, 0x8, 0xfffffffffffffffd, 0x9, 0xffffffffffffffe1}}) 05:25:10 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'deb.g_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 459.696380][T30186] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000001000" or missing value 05:25:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:11 executing program 2: socket$netlink(0x10, 0x3, 0x9) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000000, 0x1410, r0, 0x80000000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)="7448de0fe61cfd208ae452e689fc76ccd6b0a999b8fc4422cfc7f52a1853e21d2200af08019390e4fb09df1291ecfabc1c7319", 0x4e, 0xffffffffffffffff) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x3008158436610bd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 459.909917][T30202] EXT4-fs (sda1): Unrecognized mount option "deb.g_want_extra_isize=0x0000000000001000" or missing value 05:25:11 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f0000000340)='./file0\x00', 0x8, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) mount$overlay(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='overlay\x00', 0x12736687c1cbd205, &(0x7f0000000480)={[{@index_on='index=on'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@index_on='index=on'}, {@metacopy_off='metacopy=off'}, {@index_on='index=on'}, {@xino_auto='xino=auto'}, {@metacopy_on='metacopy=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [{@permit_directio='permit_directio'}, {@fsname={'fsname', 0x3d, 'user\x00'}}, {@fsname={'fsname', 0x3d, 'trusted.overlay.redirect\x00'}}, {@subj_role={'subj_role', 0x3d, 'GPL@keyring'}}, {@seclabel='seclabel'}]}) 05:25:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'deb0g_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:11 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10a00, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=0x0, &(0x7f0000000340)=0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000380)={r1, 0x9}, 0x8) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x55595659, 0x0, 0x0, [{0x0, 0x3}]}}}) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r2, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r3, r2}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:11 executing program 4: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 460.229416][T30219] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000001000" or missing value [ 460.383435][T30230] EXT4-fs (sda1): Unrecognized mount option "deb0g_want_extra_isize=0x0000000000001000" or missing value 05:25:13 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:13 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000000)=0xd38, 0x4) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$TIOCSLCKTRMIOS(r4, 0x5457, &(0x7f0000000280)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5dc, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r5, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:13 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, 0x0, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440), &(0x7f00000000c0), 0x0, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) 05:25:14 executing program 4: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debXg_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:14 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 462.779865][T30253] encrypted_key: insufficient parameters specified [ 462.800252][T30248] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000001000" or missing value [ 462.850944][T30259] encrypted_key: insufficient parameters specified 05:25:14 executing program 3: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:14 executing program 4: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 462.968134][T30262] EXT4-fs (sda1): Unrecognized mount option "debXg_want_extra_isize=0x0000000000001000" or missing value 05:25:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'deb\\g_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:14 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0x7, 0xfffffffffffffffa}, 0x2}, 0x10) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$VIDIOC_TRY_FMT(r4, 0xc0d05640, &(0x7f0000000480)={0x2, @raw_data="e250bf934b54e6c6d261b87217e2eaa3f271c34bae563f0b345b193b0d9043a3c1643d955922c1f826b48eb13c2759fb057a49069a2906594df041a37d5ac1289000b5fc9334dc403af735293b5c6b8eca3e12107f390a300f7a9e611ca0cfdec5846799765cfd912d568bcff127bef25eca150aad752afcedc353f4be45b7e039238de2625f48f2192eb623b776d87bf2d844065e20d5346bdeb58a5d58d8b75afbd0b7c29d5c4ce82471ddc3b12bc0de451abf13ac0bf31ead5e164e5eb75da790687e8579760a"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r5, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:14 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x0, 0x5, 0x4, 0x20000, {0x77359400}, {0x2, 0x0, 0x4, 0x4, 0x3000000, 0x10001, "00f500"}, 0x9, 0x2, @userptr=0x2, 0x1}) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000340)='syz', r3) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:14 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 463.367084][T30279] EXT4-fs (sda1): Unrecognized mount option "deb\g_want_extra_isize=0x0000000000001000" or missing value [ 463.480269][T30289] EXT4-fs (sda1): Unrecognized mount option "deb\g_want_extra_isize=0x0000000000001000" or missing value 05:25:17 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:17 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x3}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x6d0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x6d261fe243c10b5f, 0x0) ioctl$KVM_SET_GSI_ROUTING(r2, 0x4008ae6a, &(0x7f0000000580)=ANY=[@ANYBLOB="03000000000000000100d0791919e33e4b62f26603d6e96e0000040000008100000000000000b7070000000000000100000000000000010000000000000000040000050000000180000004000000000000000000000001000000d3920000000000000000000000000000000000000000000000000000000001000000001f0000000000000000b456000005000700000000000400000000000000000000000000000000000000657e6bbf4019cad4074619fcb54d785b82e666d95d5e8b941d5d75bad265dc592a53375279f31d61e8db4341e786460c07ff9258bbdb9498b793aad35b6f196407"]) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) setsockopt$inet6_dccp_int(r3, 0x21, 0x6612d07ae9009657, &(0x7f0000000480)=0x93b, 0x4) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r5, &(0x7f0000000280), 0x1000) sendfile(r5, r6, 0x0, 0xdd) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x608600, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r6, 0x404c534a, &(0x7f0000000340)={0x2, 0x3, 0x592}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debcg_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:17 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:17 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000580)={r4, r1, 0x81, 0xc8, &(0x7f0000000480)="eed092b29dbab0d473c27baa0e8af9aa2043710d365e9f0f7bfd033e0f453fd4e679c2d83a1ec4612608f7106e7386036a9ae2d9ffac31cd0e7aa2b7d23f2748879cce4973c0abfd6ff87cbd40bfdc6e34ad3fdd6b2e96b3b3cb89519489afe3731a0e97f4264d3ccd513315c00df3b2371b6c8d2fe0e2b41160ccedb959ebd5643d1784e006dca939ee095a98bee9c80a487baa9aa7bea120d8dba98f6d6f973796b3c0b5426fbd0eac2389eec3aa62b875b8d4e54cc0b9d78058cc59eb5fcd8709f051baa34921", 0x7, 0x5, 0x2, 0x7f, 0x1b7, 0x1, 0x3, 'syz0\x00'}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:17 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000500)={0x0, 0x5, 0x4, 0x20000, {0x77359400}, {0x2, 0x0, 0x4, 0x4, 0x3000000, 0x10001, "00f500"}, 0x9, 0x2, @userptr=0x2, 0x1}) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, r0) request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f0000000340)='syz', r3) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 465.902340][T30313] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000001000" or missing value 05:25:17 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = getpgrp(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={r2, r4, 0xee00}, 0xc) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r5, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r5, r6, r5}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) getsockname$netrom(r8, &(0x7f0000000340)={{0x3, @bcast}, [@bcast, @default, @null, @bcast, @null, @remote, @null, @default]}, &(0x7f0000000000)=0x48) 05:25:17 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 466.092594][T30327] EXT4-fs (sda1): Unrecognized mount option "debcg_want_extra_isize=0x0000000000001000" or missing value 05:25:17 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) setsockopt$inet6_dccp_buf(r2, 0x21, 0x1, &(0x7f0000000480)="bf4976f589fb3cab65582a9df7904b3d6309ce251db47da5eee23cefbb2d9fe7b9da36196797c98c61cc3957539226102c38900d954cb671f2651b54ee5c94cfafbf3ee0b4d71c2ca4a2c7eecd320266f6bd02e69af737e232c0deca8fba9198dca960557d64a37d46d74061a38437b0504794626e996e6dee3b159458bca30d3b8706718ececcf2db93e6d3aacfc7cbc808b348017b5891b18faea419e1c93f0a02503b3afbc7", 0xa7) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000340)={{0x71de, 0x21}, {0x5, 0x1}, 0x747, 0x6, 0x6}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/sockstat\x00') keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:17 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debdg_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:17 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1ff, 0x0) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000280)=0xff, &(0x7f0000000340)=0x2) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:17 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000480)={'team_slave_0\x00', 0x4, 0x8001}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 466.530318][T30351] EXT4-fs (sda1): Unrecognized mount option "debdg_want_extra_isize=0x0000000000001000" or missing value 05:25:17 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000001, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x42474752, 0x5, 0x0, [{0x20}, {}, {}, {}, {}, {0x0, 0x100}], 0x0, 0x0, 0x4}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:17 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {0xfffffffffffffffe}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) mknodat(r2, &(0x7f0000000000)='./file0\x00', 0x4, 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:17 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 466.771363][T30367] EXT4-fs (sda1): Unrecognized mount option "debdg_want_extra_isize=0x0000000000001000" or missing value 05:25:18 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 05:25:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debig_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:18 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x2, @sliced={0xddb0, [0x4, 0xfffffffffffffffa, 0x4, 0x1ff, 0x0, 0x7, 0x4, 0x7, 0x100000001, 0x1, 0x100000000, 0x8, 0x401, 0x0, 0x6, 0x1, 0x5, 0x0, 0x4, 0x8, 0x8001, 0x8001, 0x0, 0xff, 0x4, 0xfffffffffffff801, 0x4, 0xfffffffffffffeff, 0x4de, 0x2d0, 0x8, 0x2, 0x10000, 0x4, 0x4, 0xffff, 0xff, 0x5, 0x101, 0x6, 0x2040000, 0x7ff, 0xffffffff80000000, 0x1, 0x7fffffff, 0x247, 0x80000000, 0xd97e], 0x4}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x5501eabe53a00c94, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)={0xcc, r2, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x84, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hwsim0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nlmon0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3f}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x406}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20000004}, 0x5dcf9bafe1c13f79) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:18 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000580)={r4, r1, 0x81, 0xc8, &(0x7f0000000480)="eed092b29dbab0d473c27baa0e8af9aa2043710d365e9f0f7bfd033e0f453fd4e679c2d83a1ec4612608f7106e7386036a9ae2d9ffac31cd0e7aa2b7d23f2748879cce4973c0abfd6ff87cbd40bfdc6e34ad3fdd6b2e96b3b3cb89519489afe3731a0e97f4264d3ccd513315c00df3b2371b6c8d2fe0e2b41160ccedb959ebd5643d1784e006dca939ee095a98bee9c80a487baa9aa7bea120d8dba98f6d6f973796b3c0b5426fbd0eac2389eec3aa62b875b8d4e54cc0b9d78058cc59eb5fcd8709f051baa34921", 0x7, 0x5, 0x2, 0x7f, 0x1b7, 0x1, 0x3, 'syz0\x00'}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:18 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) [ 467.181217][T30388] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000001000" or missing value 05:25:18 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, &(0x7f0000000000)) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 467.350907][T30405] EXT4-fs (sda1): Unrecognized mount option "debig_want_extra_isize=0x0000000000001000" or missing value 05:25:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'deblg_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:19 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 05:25:19 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000580)={r4, r1, 0x81, 0xc8, &(0x7f0000000480)="eed092b29dbab0d473c27baa0e8af9aa2043710d365e9f0f7bfd033e0f453fd4e679c2d83a1ec4612608f7106e7386036a9ae2d9ffac31cd0e7aa2b7d23f2748879cce4973c0abfd6ff87cbd40bfdc6e34ad3fdd6b2e96b3b3cb89519489afe3731a0e97f4264d3ccd513315c00df3b2371b6c8d2fe0e2b41160ccedb959ebd5643d1784e006dca939ee095a98bee9c80a487baa9aa7bea120d8dba98f6d6f973796b3c0b5426fbd0eac2389eec3aa62b875b8d4e54cc0b9d78058cc59eb5fcd8709f051baa34921", 0x7, 0x5, 0x2, 0x7f, 0x1b7, 0x1, 0x3, 'syz0\x00'}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:19 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x342387c300e89d84, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000280)=0x100000, 0x4) 05:25:19 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) fstat(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r5 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r5, r6, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',group_i', @ANYRESDEC=r6, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000600)=0xe8) mount$fuse(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='fuse\x00', 0x10081, &(0x7f0000000640)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xa5}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x800}}], [{@fowner_gt={'fowner>', r7}}, {@smackfshat={'smackfshat', 0x3d, 'syz'}}, {@subj_role={'subj_role'}}, {@dont_hash='dont_hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'eth1-)&security'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x4f, 0x35, 0x65, 0x30, 0x30, 0x32, 0x65], 0x2d, [0x30, 0x63, 0x37, 0x62], 0x2d, [0x35, 0x34, 0x31, 0x31], 0x2d, [0x34, 0x32, 0xfca9fbcf0259e8ab, 0x32], 0x2d, [0x34, 0x38, 0x34, 0x38, 0x38, 0x31, 0x61, 0x65]}}}, {@appraise='appraise'}, {@dont_measure='dont_measure'}, {@obj_user={'obj_user', 0x3d, 'syz'}}]}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000280)=0xc) r8 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r8, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 467.847369][T30532] EXT4-fs: 1 callbacks suppressed [ 467.847383][T30532] EXT4-fs (sda1): Unrecognized mount option "deblg_want_extra_isize=0x0000000000001000" or missing value 05:25:19 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x183282) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) ioctl$EVIOCSREP(r5, 0x40084503, &(0x7f0000000580)=[0xffff, 0x80]) r6 = add_key$user(&(0x7f00000003c0)='\x00\x00\x00\x00\x10', &(0x7f0000000440)={'\x00\x1a\x00'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) r9 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r9) setsockopt$inet_mreqn(r9, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="010000006746e9604d7510bbe1eb666a3d", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f00000000c0)={r11}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r9, 0x84, 0xf, &(0x7f00000005c0)={r11, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r11, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000340)={r11, 0x3}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r8, 0x84, 0x7b, &(0x7f0000000400)={r12, 0x200}, &(0x7f0000000480)=0x8) 05:25:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debog_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:19 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) keyctl$update(0x2, 0x0, &(0x7f0000000240)="db40951195b6532950", 0x9) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$cont(0x18, r4, 0x0, 0x5) ptrace$cont(0x7, r4, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x80000000, 0x180000000000, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x3, 0x100, 0x0, 0x4, 0x8001, 0x8, 0x3ff, 0x6, 0x7b, 0x5, 0x0, 0x1f, 0x77, 0x800, 0xffff, 0xe295, 0x5, 0x203, 0x3, 0x1, 0x9, 0x6, 0x20, 0x5, 0x5000000, 0x2, 0x1, 0x2, 0x7ff, 0x0, 0x0, 0x4, @perf_config_ext={0xbc, 0x4}, 0x2, 0x7, 0x4, 0x9, 0x5, 0x3, 0x6}, r4, 0xb, 0xffffffffffffffff, 0x4) [ 468.249022][T30553] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000001000" or missing value 05:25:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:19 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x1) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x5) ptrace$cont(0x7, r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = request_key(&(0x7f0000000280)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='eth0cpuset\x00', 0xffffffffffffffff) r4 = add_key$user(&(0x7f0000000000)='\x00\x00\x00\x84\x87', &(0x7f0000000440)={'Ryz'}, &(0x7f00000000c0), 0x42e, r3) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x9289edb3a6ad4f4e}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x200, 0x70bd25, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x12000024}, 0x4) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-monitor\x00', 0x8000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000580)=0x2, 0x4) 05:25:19 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000002, 0x1010, 0xffffffffffffffff, 0x8000000) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 468.391546][T30562] EXT4-fs (sda1): Unrecognized mount option "debog_want_extra_isize=0x0000000000001000" or missing value 05:25:19 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) 05:25:19 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x342387c300e89d84, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000280)=0x100000, 0x4) 05:25:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debpg_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:19 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0x88, 0x0) 05:25:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:19 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x0) sendto$x25(r0, &(0x7f0000000600)="22d16bccec7bf23c26295ba6cd31e21db4c7abdb159fa29523e345eb90c4d19b160e5a292e32b1b8f2bff164800c02d8538788556e0315c68e31e6f5a74d9a6c95ada10e860841c89a57d1", 0x4b, 0xd3376c8b90877b1a, &(0x7f0000000280)={0x9, @null=' \x00'}, 0x12) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) ioctl$FS_IOC_SETFSLABEL(r5, 0x41009432, &(0x7f0000000500)="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") sendfile(r3, r4, 0x0, 0xdd) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f0000000480)={0x6, 0x2, 0x9, 0x3, &(0x7f0000000340)=[{}, {}]}) 05:25:20 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = socket$unix(0x1, 0x5, 0x0) recvfrom$unix(r1, &(0x7f0000000480)=""/153, 0x99, 0x22, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 468.773496][T30685] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000001000" or missing value 05:25:20 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000002, 0x1010, 0xffffffffffffffff, 0x8000000) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:20 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = creat(&(0x7f0000000000)='./file0\x00', 0xbc) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000280)={0xb, {0x513, 0x20, 0x374, 0x2}}) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 468.981632][T30703] EXT4-fs (sda1): Unrecognized mount option "debpg_want_extra_isize=0x0000000000001000" or missing value 05:25:20 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000000480)={{0x1, @name="ea0df49c9a549a440558954aa7187d8f040dbfdb3b4a15a9b8c11d999d34aa65"}, "b038e673b5a8af004c416afc456cb022c3999b07d90a3c839a48264a91f9e920", 0x2}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debsg_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:20 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x1b, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:20 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x400000000, 0x100000003, 0x4, {0x0, @pix_mp={0x0, 0x0, 0x42323151}}}) r0 = add_key$user(&(0x7f0000000200)='u\xef\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)="90", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000000)={0x32, @local, 0x4e23, 0x3, 'ovf\x00', 0x18, 0x545, 0x1}, 0x2c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 469.378642][T30726] EXT4-fs (sda1): Unrecognized mount option "debsg_want_extra_isize=0x0000000000001000" or missing value 05:25:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x1a8a03b, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:20 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x9) sendfile(r1, 0xffffffffffffffff, 0x0, 0xdd) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:20 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000000)={0x1, 0x1, 0x0, 0x7}, 0x10) r3 = geteuid() r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000480)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000280)=0xe8) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) fstat(r7, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r3, r6, r9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debxg_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:20 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:21 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x15, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:21 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) select(0x40, &(0x7f0000000000)={0x8, 0x5, 0x0, 0x7, 0x4, 0x7ff, 0x10000, 0x3}, &(0x7f0000000280)={0x9, 0x9ff4, 0x1, 0x7fff, 0xffffffffffffff3c, 0x2a42, 0x0, 0x5}, &(0x7f0000000340)={0x4, 0x3, 0x4, 0xe0, 0x40, 0xa, 0x6d1b, 0xd89e}, &(0x7f0000000380)={0x77359400}) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) connect$bt_rfcomm(r2, &(0x7f0000000400)={0x1f, {0x330, 0x5292, 0x3, 0xbfa4, 0x10000, 0x3}, 0x22}, 0xa) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 469.840847][T30758] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000001000" or missing value 05:25:21 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000280)={r3, &(0x7f0000000480)="f1b2965a5bce5ab7be14fbbb21b03705d21e4055384ed37b34175e86f0aeba65b7729c0bdedbdc12c76e305e4a2d5cf674b5abf4a4aa7a84c3f4aa1f2b3caa02c8d205ae8d68b9525b6a8d950b85c802ca7f9b8f5235225c089fa7dee4f14673aad48f83c627004dbd03cfbf919279b1f4b85afb089a89c5bf784cd5b7d9c6a2c177b887c660c5e2742547d424f6a4d7c736669587", &(0x7f0000000000)=""/10, 0x4}, 0x20) [ 470.025014][T30769] EXT4-fs (sda1): Unrecognized mount option "debxg_want_extra_isize=0x0000000000001000" or missing value 05:25:21 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x8000) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000480)={0x0, 0x2, &(0x7f0000000280)=[0x400, 0x2], &(0x7f0000000340)=[0x4, 0x8000, 0x3, 0x10001, 0x9, 0x1, 0x8, 0xece], 0x45, 0x4, 0x100, &(0x7f0000000380)=[0x200, 0x80e4, 0x2, 0x7], &(0x7f0000000400)}) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-control\x00', 0x102c0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) r6 = socket$caif_stream(0x25, 0x1, 0x1) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f00000004c0)={r6, 0x0, 0xffffffff, 0x6, 0x6}) ioctl$VFIO_GET_API_VERSION(r3, 0x3b64) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debu%_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 470.418474][T30787] EXT4-fs (sda1): Unrecognized mount option "debu%_want_extra_isize=0x0000000000001000" or missing value 05:25:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x6) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r2, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, 0x0, r2}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:21 executing program 2: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debuc_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:21 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x5, 0x8000) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f0000000480)={0x0, 0x2, &(0x7f0000000280)=[0x400, 0x2], &(0x7f0000000340)=[0x4, 0x8000, 0x3, 0x10001, 0x9, 0x1, 0x8, 0xece], 0x45, 0x4, 0x100, &(0x7f0000000380)=[0x200, 0x80e4, 0x2, 0x7], &(0x7f0000000400)}) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-control\x00', 0x102c0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) r6 = socket$caif_stream(0x25, 0x1, 0x1) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f00000004c0)={r6, 0x0, 0xffffffff, 0x6, 0x6}) ioctl$VFIO_GET_API_VERSION(r3, 0x3b64) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 470.777283][T30813] EXT4-fs (sda1): Unrecognized mount option "debuc_want_extra_isize=0x0000000000001000" or missing value 05:25:24 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xe, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:24 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='\x01\x00', &(0x7f0000000300)={'sy:', 0x0}, &(0x7f00000002c0)='\x00', 0x1, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000480)={0x0, 0x0, 0x2080}) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, r3) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_dev$mice(&(0x7f0000002640)='/dev/input/mice\x00', 0x0, 0x5000) r7 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r7) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002800)=ANY=[@ANYBLOB="0100000075df310bb17af66145df2d23a9a1f51219ff04afcc9f527ede1e5402cf6b0f679bf64a5012f98d5407e6ee356c28f6b97bd9cb474d2b6e5565352f9c17f23e484ed47e9b587f4239766c0430974be9c85ab629b73b04f7cb7b376f079aea4d835c85a5ed789f9edf099bdaf06ce31ef9f58c7fe62ae34a", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f00000005c0)={r9, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r9, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000002680)={r9, 0x81, "adaf6bc25d6fc8d90cc41003a705fb7063782498c94671419380969160138c81259e4580f6e1427b0d6235bab9557ce20dff0c5671c915561c7b1f661f64a68c217c13811744ba0c36c7c8977732592087eba940d270ae528508377a0f18dc5f235fa2e3ceeb960ef2d147c763fbe2f299e623894d79097ad31eced879bbb15f97"}, &(0x7f0000002740)=0x89) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000002780)={r10}, &(0x7f00000027c0)=0x8) ioctl$DRM_IOCTL_RM_MAP(r6, 0x4028641b, &(0x7f0000002880)={&(0x7f0000ffd000/0x3000)=nil, 0xdfa, 0x5, 0x10, &(0x7f0000ffb000/0x4000)=nil, 0x4}) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r11, 0x0, 0xdd) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000380)={0xffffffffffffffff}, 0x11, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000002500)={0x8, 0x120, 0xfa00, {0x2, {0x4, 0x4, "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", 0x53, 0x4, 0x401, 0x8, 0x0, 0x400, 0x80000001, 0x1}, r12}}, 0x128) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:24 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f0000000100)={0x0, 0xa, &(0x7f00000000c0)={&(0x7f0000000280)={0x20, r5, 0x701, 0x0, 0x0, {0x13, 0x0, 0x1a0ffffffff}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x930}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)={0x5c, r5, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc1e}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8001}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) r6 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r6, 0xc00000000000000) shmctl$SHM_UNLOCK(r6, 0xc) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r7, 0x0, 0xdd) ioctl$UI_SET_LEDBIT(r7, 0x40045569, 0x8) memfd_create(&(0x7f0000000400)='TIPCv2\x00', 0x4) 05:25:24 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x12, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_w%nt_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 472.846228][T30839] encrypted_key: insufficient parameters specified [ 472.902133][T30837] EXT4-fs: 1 callbacks suppressed [ 472.902148][T30837] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000001000" or missing value 05:25:24 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0xe, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:24 executing program 0: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x1e, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 473.037724][T30947] EXT4-fs (sda1): Unrecognized mount option "debug_w%nt_extra_isize=0x0000000000001000" or missing value [ 473.067601][T30899] encrypted_key: insufficient parameters specified 05:25:24 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x34325258, 0x0, 0x0, [{0x0, 0xfffffffffffffffe}, {}, {}, {}, {0x4000000000000000}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x844, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8202, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0x0, r1, 0x0) r2 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/attr/current\x00', 0x2, 0x0) dup(r2) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_w\\nt_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:24 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:24 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x3, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:24 executing program 4 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 473.440741][T30970] EXT4-fs (sda1): Unrecognized mount option "debug_w\nt_extra_isize=0x0000000000001000" or missing value [ 473.480947][T30978] FAULT_INJECTION: forcing a failure. [ 473.480947][T30978] name failslab, interval 1, probability 0, space 0, times 0 [ 473.543584][T30978] CPU: 0 PID: 30978 Comm: syz-executor.4 Not tainted 5.3.0-next-20190920 #0 [ 473.552308][T30978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.562435][T30978] Call Trace: [ 473.565779][T30978] dump_stack+0x172/0x1f0 [ 473.570138][T30978] should_fail.cold+0xa/0x15 [ 473.574758][T30978] ? fault_create_debugfs_attr+0x180/0x180 [ 473.580595][T30978] ? ___might_sleep+0x163/0x2c0 [ 473.585578][T30978] __should_failslab+0x121/0x190 [ 473.590645][T30978] should_failslab+0x9/0x14 [ 473.595166][T30978] __kmalloc+0x2e0/0x770 [ 473.599424][T30978] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 473.605689][T30978] ? fput_many+0x12c/0x1a0 [ 473.610124][T30978] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 473.616392][T30978] ? strnlen_user+0x1ed/0x2e0 [ 473.621083][T30978] ? __x64_sys_memfd_create+0x13c/0x470 [ 473.626873][T30978] __x64_sys_memfd_create+0x13c/0x470 [ 473.632360][T30978] ? memfd_fcntl+0x18c0/0x18c0 [ 473.637176][T30978] ? do_syscall_64+0x26/0x760 [ 473.641874][T30978] ? lockdep_hardirqs_on+0x421/0x5e0 [ 473.647168][T30978] ? trace_hardirqs_on+0x67/0x240 [ 473.652208][T30978] do_syscall_64+0xfa/0x760 [ 473.656753][T30978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.662653][T30978] RIP: 0033:0x459a09 [ 473.666585][T30978] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:25:24 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x6, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x3}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r3) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f00000000c0)={r5}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000005c0)={r5, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r5, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000280)={r5, 0x38, &(0x7f0000000000)=[@in6={0xa, 0x4e20, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, @in6={0xa, 0x4e24, 0x1800000000, @mcast1, 0x62c}]}, &(0x7f0000000340)=0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000380)) 05:25:25 executing program 5: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='\x01\x00', &(0x7f0000000300)={'sy:', 0x0}, &(0x7f00000002c0)='\x00', 0x1, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000480)={0x0, 0x0, 0x2080}) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, r3) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_dev$mice(&(0x7f0000002640)='/dev/input/mice\x00', 0x0, 0x5000) r7 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r7) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000002800)=ANY=[@ANYBLOB="0100000075df310bb17af66145df2d23a9a1f51219ff04afcc9f527ede1e5402cf6b0f679bf64a5012f98d5407e6ee356c28f6b97bd9cb474d2b6e5565352f9c17f23e484ed47e9b587f4239766c0430974be9c85ab629b73b04f7cb7b376f079aea4d835c85a5ed789f9edf099bdaf06ce31ef9f58c7fe62ae34a", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f00000005c0)={r9, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r9, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000002680)={r9, 0x81, "adaf6bc25d6fc8d90cc41003a705fb7063782498c94671419380969160138c81259e4580f6e1427b0d6235bab9557ce20dff0c5671c915561c7b1f661f64a68c217c13811744ba0c36c7c8977732592087eba940d270ae528508377a0f18dc5f235fa2e3ceeb960ef2d147c763fbe2f299e623894d79097ad31eced879bbb15f97"}, &(0x7f0000002740)=0x89) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000002780)={r10}, &(0x7f00000027c0)=0x8) ioctl$DRM_IOCTL_RM_MAP(r6, 0x4028641b, &(0x7f0000002880)={&(0x7f0000ffd000/0x3000)=nil, 0xdfa, 0x5, 0x10, &(0x7f0000ffb000/0x4000)=nil, 0x4}) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r11, 0x0, 0xdd) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000380)={0xffffffffffffffff}, 0x11, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000002500)={0x8, 0x120, 0xfa00, {0x2, {0x4, 0x4, "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", 0x53, 0x4, 0x401, 0x8, 0x0, 0x400, 0x80000001, 0x1}, r12}}, 0x128) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 473.686373][T30978] RSP: 002b:00007f89f3563a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 473.694981][T30978] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a09 [ 473.703159][T30978] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be928 [ 473.711160][T30978] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 473.719150][T30978] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f89f35646d4 [ 473.727133][T30978] R13: 00000000004c8b47 R14: 00000000004dfc08 R15: 0000000000000003 05:25:25 executing program 4 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 473.850370][T30994] encrypted_key: insufficient parameters specified [ 473.857511][T30988] EXT4-fs (sda1): Unrecognized mount option "debug_w\nt_extra_isize=0x0000000000001000" or missing value 05:25:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_wa%t_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:25 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {0xfffffffffffffffc}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:25 executing program 5 (fault-call:3 fault-nth:0): r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) [ 474.201255][T31009] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000001000" or missing value [ 474.242715][T31011] FAULT_INJECTION: forcing a failure. [ 474.242715][T31011] name failslab, interval 1, probability 0, space 0, times 0 [ 474.312282][T31011] CPU: 1 PID: 31011 Comm: syz-executor.4 Not tainted 5.3.0-next-20190920 #0 [ 474.321023][T31011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.331267][T31011] Call Trace: [ 474.334572][T31011] dump_stack+0x172/0x1f0 [ 474.338934][T31011] should_fail.cold+0xa/0x15 [ 474.343564][T31011] ? fault_create_debugfs_attr+0x180/0x180 [ 474.349402][T31011] ? ___might_sleep+0x163/0x2c0 [ 474.354285][T31011] __should_failslab+0x121/0x190 [ 474.359236][T31011] ? shmem_destroy_inode+0x80/0x80 [ 474.364351][T31011] should_failslab+0x9/0x14 [ 474.368863][T31011] kmem_cache_alloc+0x2aa/0x710 [ 474.373731][T31011] ? shmem_destroy_inode+0x80/0x80 [ 474.378848][T31011] shmem_alloc_inode+0x1c/0x50 [ 474.383619][T31011] alloc_inode+0x68/0x1e0 [ 474.387953][T31011] new_inode_pseudo+0x19/0xf0 [ 474.392633][T31011] new_inode+0x1f/0x40 [ 474.396701][T31011] shmem_get_inode+0x84/0x7e0 [ 474.401384][T31011] __shmem_file_setup.part.0+0x7e/0x2b0 [ 474.407026][T31011] shmem_file_setup+0x66/0x90 [ 474.411735][T31011] __x64_sys_memfd_create+0x2a2/0x470 [ 474.417130][T31011] ? memfd_fcntl+0x18c0/0x18c0 [ 474.421896][T31011] ? do_syscall_64+0x26/0x760 [ 474.426572][T31011] ? lockdep_hardirqs_on+0x421/0x5e0 [ 474.431858][T31011] ? trace_hardirqs_on+0x67/0x240 [ 474.436888][T31011] do_syscall_64+0xfa/0x760 [ 474.441418][T31011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.447343][T31011] RIP: 0033:0x459a09 [ 474.451241][T31011] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.470876][T31011] RSP: 002b:00007f89f3563a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 474.479298][T31011] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a09 [ 474.487305][T31011] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be928 [ 474.495289][T31011] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 474.503274][T31011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f89f35646d4 05:25:25 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @vbi={0x200, 0x5, 0x10000, 0x55595659, [0x5, 0x419821e9], [0x3, 0x1ff], 0x1}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 474.511257][T31011] R13: 00000000004c8b47 R14: 00000000004dfc08 R15: 0000000000000003 [ 474.544908][T31015] EXT4-fs (sda1): Unrecognized mount option "debug_wa%t_extra_isize=0x0000000000001000" or missing value 05:25:25 executing program 4 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_wa\\t_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 474.735268][T31023] FAULT_INJECTION: forcing a failure. [ 474.735268][T31023] name failslab, interval 1, probability 0, space 0, times 0 [ 474.789470][T31023] CPU: 1 PID: 31023 Comm: syz-executor.4 Not tainted 5.3.0-next-20190920 #0 [ 474.798200][T31023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 474.808264][T31023] Call Trace: [ 474.811597][T31023] dump_stack+0x172/0x1f0 [ 474.815955][T31023] should_fail.cold+0xa/0x15 [ 474.820581][T31023] ? fault_create_debugfs_attr+0x180/0x180 [ 474.826427][T31023] ? ___might_sleep+0x163/0x2c0 [ 474.831326][T31023] __should_failslab+0x121/0x190 [ 474.836282][T31023] should_failslab+0x9/0x14 [ 474.840794][T31023] kmem_cache_alloc+0x2aa/0x710 [ 474.845650][T31023] ? current_time+0x6b/0x110 [ 474.850251][T31023] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 474.856085][T31023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 474.862337][T31023] ? timestamp_truncate+0x20f/0x2f0 [ 474.867548][T31023] __d_alloc+0x2e/0x8c0 [ 474.871721][T31023] d_alloc_pseudo+0x1e/0x70 [ 474.876238][T31023] alloc_file_pseudo+0xe2/0x280 [ 474.881188][T31023] ? alloc_file+0x4d0/0x4d0 [ 474.885707][T31023] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 474.892147][T31023] __shmem_file_setup.part.0+0x108/0x2b0 [ 474.897883][T31023] shmem_file_setup+0x66/0x90 [ 474.902583][T31023] __x64_sys_memfd_create+0x2a2/0x470 [ 474.907976][T31023] ? memfd_fcntl+0x18c0/0x18c0 [ 474.912753][T31023] ? do_syscall_64+0x26/0x760 [ 474.917449][T31023] ? lockdep_hardirqs_on+0x421/0x5e0 [ 474.922752][T31023] ? trace_hardirqs_on+0x67/0x240 [ 474.927813][T31023] do_syscall_64+0xfa/0x760 [ 474.932337][T31023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 474.938242][T31023] RIP: 0033:0x459a09 [ 474.942169][T31023] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 474.961782][T31023] RSP: 002b:00007f89f3563a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 474.970209][T31023] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a09 [ 474.978190][T31023] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be928 [ 474.986282][T31023] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 474.994261][T31023] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f89f35646d4 [ 475.002763][T31023] R13: 00000000004c8b47 R14: 00000000004dfc08 R15: 0000000000000003 [ 475.059740][T31028] EXT4-fs (sda1): Unrecognized mount option "debug_wa\t_extra_isize=0x0000000000001000" or missing value [ 475.200079][T31033] EXT4-fs (sda1): Unrecognized mount option "debug_wa\t_extra_isize=0x0000000000001000" or missing value 05:25:27 executing program 0 (fault-call:4 fault-nth:0): r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:27 executing program 4 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:27 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x6) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000b55000)={0x2, 0x2, @broadcast}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f00000000c0)=0x100000000000006) sendto$inet(r3, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x1, [@dev]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000340)='./file0\x00', 0x0, 0x2001091, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @udp={0x0, 0x2, 0x8}}}}}}, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in6=@local}}, {{@in6=@loopback}, 0x0, @in6=@remote}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x40000) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 05:25:27 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000480)=""/250, 0xfa}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/73, 0x49}, {}, {&(0x7f0000000280)=""/39, 0x27}, {&(0x7f0000001600)=""/200, 0xc8}, {&(0x7f0000001700)=""/118, 0x76}], 0x7, &(0x7f0000001800)=""/254, 0xfe}, 0x40000000) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000001900)={{0xc, @local, 0x4e20, 0x1, 'sh\x00', 0x1, 0x0, 0x7a}, {@loopback, 0x4e22, 0x2000, 0x7, 0x2, 0x3}}, 0x44) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) connect$rds(r3, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r4, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) r7 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r8 = socket$netlink(0x10, 0x3, 0x9) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r8, r9, 0x0, 0xdd) r10 = socket$netlink(0x10, 0x3, 0x9) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r10, r11, 0x0, 0xdd) fsconfig$FSCONFIG_SET_PATH_EMPTY(r9, 0x4, &(0x7f0000001ac0)='em0#\x00', &(0x7f0000001b00)='./bus\x00', r11) syncfs(r7) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001a00)=ANY=[@ANYBLOB="00002000588e83355b93c7f1fe58f33375db4524383cdd2078890f6b8917876ac3317a4da6d0120e4944369036cd8f7aab57b5f5ad94e25d364c46eb3096ea3dca42e0c30aa62da3da1b6f4414df86d9883a7083654e35ee5c1cd628bb9e2f9ce70efba7d495fd1c2f336fee3bff9048541401ec2a31a7f0b0176b597b598a393c2d9b8fbe8ba3d78f6a3ebb50055d787f2ebc73779d38117bd8ae8911", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r12, 0x84, 0x1, &(0x7f00000000c0)={r13}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0xf, &(0x7f00000005c0)={r13, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r13, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000001980)={r13, 0x5, 0x9, 0x6, 0xffffffffbdd9394b, 0x1}, &(0x7f00000019c0)=0x14) 05:25:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_wan%_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 476.577495][T31043] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000001000" or missing value [ 476.621096][T31052] FAULT_INJECTION: forcing a failure. [ 476.621096][T31052] name failslab, interval 1, probability 0, space 0, times 0 [ 476.732160][T31052] CPU: 0 PID: 31052 Comm: syz-executor.4 Not tainted 5.3.0-next-20190920 #0 [ 476.740988][T31052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.751232][T31052] Call Trace: [ 476.754543][T31052] dump_stack+0x172/0x1f0 [ 476.757209][T31054] EXT4-fs (sda1): Unrecognized mount option "debug_wan%_extra_isize=0x0000000000001000" or missing value [ 476.758912][T31052] should_fail.cold+0xa/0x15 [ 476.758932][T31052] ? fault_create_debugfs_attr+0x180/0x180 [ 476.758960][T31052] ? ___might_sleep+0x163/0x2c0 [ 476.785536][T31052] __should_failslab+0x121/0x190 [ 476.790480][T31052] should_failslab+0x9/0x14 [ 476.795002][T31052] kmem_cache_alloc+0x2aa/0x710 [ 476.799869][T31052] ? rwlock_bug.part.0+0x90/0x90 [ 476.804833][T31052] ? lock_downgrade+0x920/0x920 [ 476.809688][T31052] __alloc_file+0x27/0x340 [ 476.814116][T31052] alloc_empty_file+0x72/0x170 [ 476.818999][T31052] alloc_file+0x5e/0x4d0 [ 476.823266][T31052] alloc_file_pseudo+0x189/0x280 [ 476.828223][T31052] ? alloc_file+0x4d0/0x4d0 [ 476.832856][T31052] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 476.839206][T31052] __shmem_file_setup.part.0+0x108/0x2b0 [ 476.844859][T31052] shmem_file_setup+0x66/0x90 [ 476.849552][T31052] __x64_sys_memfd_create+0x2a2/0x470 [ 476.854922][T31052] ? memfd_fcntl+0x18c0/0x18c0 [ 476.859689][T31052] ? do_syscall_64+0x26/0x760 [ 476.864383][T31052] ? lockdep_hardirqs_on+0x421/0x5e0 [ 476.869678][T31052] ? trace_hardirqs_on+0x67/0x240 [ 476.874718][T31052] do_syscall_64+0xfa/0x760 [ 476.879240][T31052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 476.885139][T31052] RIP: 0033:0x459a09 [ 476.889038][T31052] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 476.908728][T31052] RSP: 002b:00007f89f3563a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 476.917137][T31052] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a09 [ 476.925103][T31052] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be928 05:25:28 executing program 4 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 476.933084][T31052] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 476.941050][T31052] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f89f35646d4 [ 476.949155][T31052] R13: 00000000004c8b47 R14: 00000000004dfc08 R15: 0000000000000003 05:25:28 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_wan/_extra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 477.058662][T31063] FAULT_INJECTION: forcing a failure. [ 477.058662][T31063] name failslab, interval 1, probability 0, space 0, times 0 [ 477.093294][T31063] CPU: 1 PID: 31063 Comm: syz-executor.4 Not tainted 5.3.0-next-20190920 #0 [ 477.102031][T31063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.112187][T31063] Call Trace: [ 477.115493][T31063] dump_stack+0x172/0x1f0 [ 477.119841][T31063] should_fail.cold+0xa/0x15 [ 477.124448][T31063] ? fault_create_debugfs_attr+0x180/0x180 [ 477.130267][T31063] ? ___might_sleep+0x163/0x2c0 [ 477.135139][T31063] __should_failslab+0x121/0x190 [ 477.140086][T31063] should_failslab+0x9/0x14 [ 477.144595][T31063] kmem_cache_alloc+0x2aa/0x710 [ 477.149463][T31063] ? kmem_cache_alloc+0x364/0x710 [ 477.154493][T31063] security_file_alloc+0x39/0x170 [ 477.159533][T31063] __alloc_file+0xde/0x340 [ 477.163958][T31063] alloc_empty_file+0x72/0x170 [ 477.168730][T31063] alloc_file+0x5e/0x4d0 [ 477.172978][T31063] alloc_file_pseudo+0x189/0x280 [ 477.178008][T31063] ? alloc_file+0x4d0/0x4d0 [ 477.182519][T31063] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 477.188796][T31063] __shmem_file_setup.part.0+0x108/0x2b0 [ 477.194444][T31063] shmem_file_setup+0x66/0x90 [ 477.199288][T31063] __x64_sys_memfd_create+0x2a2/0x470 [ 477.204669][T31063] ? memfd_fcntl+0x18c0/0x18c0 [ 477.209433][T31063] ? do_syscall_64+0x26/0x760 [ 477.214116][T31063] ? lockdep_hardirqs_on+0x421/0x5e0 [ 477.219405][T31063] ? trace_hardirqs_on+0x67/0x240 [ 477.224450][T31063] do_syscall_64+0xfa/0x760 [ 477.228966][T31063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.234858][T31063] RIP: 0033:0x459a09 [ 477.238753][T31063] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.258538][T31063] RSP: 002b:00007f89f3563a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 477.266962][T31063] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459a09 [ 477.274941][T31063] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be928 [ 477.282921][T31063] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 477.290895][T31063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f89f35646d4 [ 477.298873][T31063] R13: 00000000004c8b47 R14: 00000000004dfc08 R15: 0000000000000003 05:25:28 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:28 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:28 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0xf, {0x0, @pix_mp={0x10000, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xffffffffffffff01}, {}, {}, {0x0, 0x80000001}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000000)) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:28 executing program 4 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 477.759144][T31087] FAULT_INJECTION: forcing a failure. [ 477.759144][T31087] name failslab, interval 1, probability 0, space 0, times 0 [ 477.781609][T31087] CPU: 0 PID: 31087 Comm: syz-executor.4 Not tainted 5.3.0-next-20190920 #0 [ 477.790343][T31087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.800422][T31087] Call Trace: [ 477.800460][T31087] dump_stack+0x172/0x1f0 [ 477.800482][T31087] should_fail.cold+0xa/0x15 [ 477.812683][T31087] ? fault_create_debugfs_attr+0x180/0x180 [ 477.818523][T31087] ? ___might_sleep+0x163/0x2c0 [ 477.818543][T31087] __should_failslab+0x121/0x190 [ 477.828349][T31087] should_failslab+0x9/0x14 [ 477.832885][T31087] __kmalloc+0x2e0/0x770 [ 477.837136][T31087] ? mark_held_locks+0xf0/0xf0 [ 477.841912][T31087] ? stack_trace_save+0xac/0xe0 [ 477.846780][T31087] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 477.852517][T31087] tomoyo_realpath_from_path+0xcd/0x7b0 [ 477.858080][T31087] ? tomoyo_path_perm+0x1cb/0x430 [ 477.863123][T31087] tomoyo_path_perm+0x230/0x430 [ 477.867987][T31087] ? tomoyo_path_perm+0x1cb/0x430 [ 477.873032][T31087] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 477.879180][T31087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.885453][T31087] ? rcu_read_lock_any_held+0xcd/0xf0 [ 477.890832][T31087] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 477.896120][T31087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.902536][T31087] tomoyo_path_truncate+0x1d/0x30 [ 477.907560][T31087] security_path_truncate+0xf2/0x150 [ 477.912851][T31087] do_sys_ftruncate+0x3d9/0x550 [ 477.917711][T31087] __x64_sys_ftruncate+0x59/0x80 [ 477.922651][T31087] do_syscall_64+0xfa/0x760 [ 477.927161][T31087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.933050][T31087] RIP: 0033:0x4599d7 [ 477.937325][T31087] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.956939][T31087] RSP: 002b:00007f89f3563a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 477.965445][T31087] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004599d7 [ 477.973464][T31087] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 477.981442][T31087] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 477.989412][T31087] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 477.997384][T31087] R13: 00000000004c8b47 R14: 00000000004dfc08 R15: 0000000000000003 [ 478.016109][T31087] ERROR: Out of memory at tomoyo_realpath_from_path. [ 479.270535][ T7] device bridge_slave_1 left promiscuous mode [ 479.276763][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.330471][ T7] device bridge_slave_0 left promiscuous mode [ 479.336882][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 05:25:30 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50}, 0xfde1) 05:25:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_wan\\_extra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:30 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5ba4aafe8d232f42}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:30 executing program 4 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:30 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'\x00', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000580)={0xffffffffffffffff}) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r2) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000000c0)={r4}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000005c0)={r4, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r4, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000006c0)={r4, 0x4}, &(0x7f0000000700)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000740)={r5, 0x3, 0x9, [0x3, 0x9, 0xfff, 0xb1, 0x8, 0x8, 0xffffffffffff8000, 0x13, 0x8001]}, &(0x7f0000000780)=0x1a) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000540)="fe9b58f838ac337dc88762c20f953b7b0f7cbb7949e5fd25841337c637f55904400cfc80a2d992eb5ef467d4d9fe43fd3eb065", 0x33, 0x0) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r7 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff3000/0x4000)=nil) shmctl$IPC_STAT(r7, 0x2, &(0x7f0000000100)=""/104) shmctl$IPC_STAT(r7, 0x2, &(0x7f0000000480)=""/153) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x1c1e00, 0x0) r9 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r9) setsockopt$inet_mreqn(r9, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r10, 0x84, 0x1, &(0x7f00000000c0)={r11}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r9, 0x84, 0xf, &(0x7f00000005c0)={r11, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r11, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(r8, 0x84, 0x11, &(0x7f0000000280)={r11, 0xb22c}, &(0x7f0000000340)=0x8) [ 479.642865][T31099] EXT4-fs: 2 callbacks suppressed [ 479.642881][T31099] EXT4-fs (sda1): Unrecognized mount option "debug_wan\_extra_isize=0x0000000000001000" or missing value [ 479.689841][T31100] FAULT_INJECTION: forcing a failure. [ 479.689841][T31100] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 479.703132][T31100] CPU: 0 PID: 31100 Comm: syz-executor.4 Not tainted 5.3.0-next-20190920 #0 [ 479.711827][T31100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.721896][T31100] Call Trace: [ 479.725237][T31100] dump_stack+0x172/0x1f0 [ 479.729581][T31100] should_fail.cold+0xa/0x15 [ 479.734790][T31100] ? fault_create_debugfs_attr+0x180/0x180 [ 479.740603][T31100] ? is_bpf_text_address+0xac/0x170 [ 479.745853][T31100] should_fail_alloc_page+0x50/0x60 [ 479.751157][T31100] __alloc_pages_nodemask+0x1a1/0x900 [ 479.756984][T31100] ? __alloc_pages_slowpath+0x28e0/0x28e0 [ 479.762912][T31100] ? __kasan_check_read+0x11/0x20 [ 479.767978][T31100] ? fault_create_debugfs_attr+0x180/0x180 [ 479.773800][T31100] cache_grow_begin+0x90/0xd20 [ 479.778576][T31100] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 479.784330][T31100] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 479.790584][T31100] __kmalloc+0x6b2/0x770 [ 479.794840][T31100] ? mark_held_locks+0xf0/0xf0 [ 479.799610][T31100] ? stack_trace_save+0xac/0xe0 [ 479.804474][T31100] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 479.810213][T31100] tomoyo_realpath_from_path+0xcd/0x7b0 [ 479.815773][T31100] ? tomoyo_path_perm+0x1cb/0x430 [ 479.820812][T31100] tomoyo_path_perm+0x230/0x430 [ 479.825671][T31100] ? tomoyo_path_perm+0x1cb/0x430 [ 479.830866][T31100] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 479.837046][T31100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.843581][T31100] ? rcu_read_lock_any_held+0xcd/0xf0 [ 479.848985][T31100] ? rcu_read_lock_bh_held+0xb0/0xb0 [ 479.854365][T31100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 479.860624][T31100] tomoyo_path_truncate+0x1d/0x30 [ 479.865661][T31100] security_path_truncate+0xf2/0x150 [ 479.870978][T31100] do_sys_ftruncate+0x3d9/0x550 [ 479.875848][T31100] __x64_sys_ftruncate+0x59/0x80 [ 479.880797][T31100] do_syscall_64+0xfa/0x760 [ 479.885321][T31100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 479.891309][T31100] RIP: 0033:0x4599d7 [ 479.895218][T31100] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 479.914839][T31100] RSP: 002b:00007f89f3563a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 479.923263][T31100] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004599d7 [ 479.931250][T31100] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 05:25:31 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000000)) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 479.939239][T31100] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 479.947227][T31100] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 [ 479.955378][T31100] R13: 00000000004c8b47 R14: 00000000004dfc08 R15: 0000000000000003 [ 480.114185][T31110] EXT4-fs (sda1): Unrecognized mount option "debug_wan\_extra_isize=0x0000000000001000" or missing value 05:25:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_%xtra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:31 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x2}, 0xfde1) [ 480.441518][T31115] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000001000" or missing value [ 480.648630][T31122] EXT4-fs (sda1): Unrecognized mount option "debug_want_%xtra_isize=0x0000000000001000" or missing value 05:25:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_\\xtra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:32 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000007c0), &(0x7f0000000800)=0x4) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) r6 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x9, 0x42) fsconfig$FSCONFIG_SET_FLAG(r6, 0x0, &(0x7f00000004c0)='lazytime\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r6, 0x40045431, &(0x7f0000000380)) signalfd(r5, &(0x7f0000000000)={0x401}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000400)=0x2, &(0x7f0000000480)=0x4) r7 = socket$netlink(0x10, 0x3, 0x9) accept4$unix(r5, &(0x7f0000000700)=@abs, &(0x7f0000000780)=0x6e, 0x1000) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) r9 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r9, 0x0, 0x11, &(0x7f0000000140)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000000c0)=0xe8) sendmsg$xdp(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000300)={0x2c, 0x4, r10, 0x14}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000340)="f37592b82765c44a702bc5170f6b382db93b64a2a00e487ebcf6ec3587a30d3d3f8cadfbfdea4dbf8c41c59c1b41d0745b04fb1f7a88ffc8b7cca910fdd2fd9961bf3c4b68bda85238ee8be9bb511dedd84a6b1dcf4d1d01608ef3221414d5cd4c94417863efaba09e18347858ce919a97c761c4e2c46cf140a9872d72f46fe1e3e7f8cdf3667ac3e0017a79a5331170cdeb62406872ccd4a4710458cae93c042d0c242d86ed6e4361c05fc3c445c40cd6020e6c66ebb566654797d42ee19645fdca6b3c254f988d3f36f279e0f17ae09624d5fda31931cef0b33526db87a8935ce70522ff", 0xe5}, {&(0x7f0000000440)="d34685bcc28ad1530bbdc97f93e81debf4f365dbd5eb92de9db0755c6a01d5fb89dbe28a376fdb51aba243e9439432e1a103ae5b3ef61eea13c1133157588b4f8d8beec6df0af197455694376fe27dd97d1c7559cb3fe9109b0a10cb4c65bb6e7fcb730e343bc59ddac231593f1c8c160499f4f23a604c950635292d9bda0a7c5e2cf788f1cb78c96efc4789d9eedd812f0e5f74642930bf396f3554cfd1ee9915ffbd272aa53a447fcbc162d3", 0xad}, {&(0x7f0000000500)="cfa23a7f70c44b20902bfd2b0850368e18a2f80d3118ac3cdf72da19bd2783534a39b30d28386d02c49bd9822fab4816d36292785143b2b6b7a6cfc355cae7a839e542360355b4d14185a40e1998fcb8a77f00b9754ebf572dfd411dc299d918bb409174a3960d77664b4d28911439f1a08cbfa448fef905f866fa31d9b15fc52e29a1f6c64cfe452a36c3c006e275fbab564154ff2bfd061802afe9184bc95ffcbf96eb9f0c6d9ca8d17bdaabde2796f5197e75fe5c6a7eea2f5107b0a52f0e05f2b71260a220b9", 0xc8}, {&(0x7f0000000600)="58be0366fc42c9b0045e738e06d06ad8ca3ce459c7724a627e2bfe09b7561bf8447326ad6ac3f4aa7bb6359e8bc3348fb0dccf9aa666be10bbfa273e9b04bb17291f7ce0abb75b8bf6d08eb1246afc49cc792652971d0cc40d2206e6f8d121ea3d0968c7216c7eb10bdbb9d204ca255fbb469b9d88bf5b90056c", 0x7a}], 0x4}, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r12, 0x0) sendmsg$nl_route(r8, &(0x7f00000006c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000680)={&(0x7f0000000540)=@ipv4_newroute={0x114, 0x18, 0x300, 0x70bd27, 0x25dfdbfc, {0x2, 0x4d6c01e9bc3806fe, 0x10, 0x5, 0xfc, 0x1, 0xc8, 0xa, 0x200}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x2}, @RTA_MULTIPATH={0xc, 0x9, {0x0, 0xf36, 0x0, r10}}, @RTA_ENCAP={0xd4, 0x16, @generic="9ec5df2b43b6cb08e08dbce612270dcb53e6c829550daca38dcebdedb86349faabdb3df80c806aac958a9934504816d593176d95e94b331367bc0fd7e41d7781e877509841e2576dd84f025bcebe245f11d4a745c0ebb2c62f98ab6dff62370778dc12796b96e7b1f3fb54c96ba604f425faf0df9fc7c0d3885520d1316d5083fde0289c06c42846a49d9bc8e94687f98bc443305035daed6f166a0cf30e4cb3605066b25c1f5f2f3582dffffc9d11181a2aa614675f4f03321a156408bb6d9360df2433c95de6b43b6ef19f5937"}, @RTA_PREFSRC={0x8, 0x7, @loopback}, @RTA_UID={0x8, 0x19, r12}]}, 0x114}, 0x1, 0x0, 0x0, 0x1}, 0x40000) [ 481.036604][T31135] EXT4-fs (sda1): Unrecognized mount option "debug_want_\xtra_isize=0x0000000000001000" or missing value [ 481.187304][T31175] EXT4-fs (sda1): Unrecognized mount option "debug_want_\xtra_isize=0x0000000000001000" or missing value 05:25:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_e%tra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 481.439930][T31252] EXT4-fs (sda1): Unrecognized mount option "debug_want_e%tra_isize=0x0000000000001000" or missing value [ 481.625985][T31256] EXT4-fs (sda1): Unrecognized mount option "debug_want_e%tra_isize=0x0000000000001000" or missing value 05:25:34 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x2}, 0xfde1) 05:25:34 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000000)) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) r6 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r6) setsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f00000000c0)={r8}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f00000005c0)={r8, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r8, 0x40, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000280)={r8, 0xfffffffffffffffb}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x440002, 0x0) accept4$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e, 0x800) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x98080, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x0, 0x68, &(0x7f00000001c0), &(0x7f0000000200)=""/104, 0xa64, 0x0, 0x1000, 0x95, &(0x7f00000003c0)="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", &(0x7f0000000280)="a1303e6a00b13829587057c3e8f654d9a50aa3743aa4a7dbbbcaa8e2c45344322f9f10d9ea112c377eb5367dbc5d652c1f278468882828e0f459568685295c26f8f3d7cb94484cec010346d3d0f50928b0f8e2cb405638006ab1165322efdb102a9d9fad6637ea6c6ec67cc9cae4e5333efa868c7e57653ac29d4b3840b376c6433a80a4af45c224a32c0b87b9c3c2d3157f39d884"}, 0x40) 05:25:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_ex%ra_isize', 0x3d, 0x1000}}], [], 0x700}) [ 482.970535][T31266] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000001000" or missing value [ 483.138098][T31379] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex%ra_isize=0x0000000000001000" or missing value [ 483.980225][ T7] device hsr_slave_0 left promiscuous mode [ 484.039486][ T7] device hsr_slave_1 left promiscuous mode [ 484.097495][ T7] team0 (unregistering): Port device team_slave_1 removed [ 484.111434][ T7] team0 (unregistering): Port device team_slave_0 removed [ 484.122749][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 484.164463][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 484.256111][ T7] bond0 (unregistering): Released all slaves [ 484.358737][T31387] IPVS: ftp: loaded support on port[0] = 21 [ 484.458685][T31387] chnl_net:caif_netlink_parms(): no params data found [ 484.528412][T31387] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.543456][T31387] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.555521][T31387] device bridge_slave_0 entered promiscuous mode [ 484.569079][T31387] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.579031][T31387] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.594111][T31387] device bridge_slave_1 entered promiscuous mode [ 484.620996][T31387] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 484.633096][T31387] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 484.661205][T31387] team0: Port device team_slave_0 added [ 484.669871][T31387] team0: Port device team_slave_1 added [ 484.732268][T31387] device hsr_slave_0 entered promiscuous mode [ 484.809682][T31387] device hsr_slave_1 entered promiscuous mode [ 484.889282][T31387] debugfs: Directory 'hsr0' with parent '/' already present! [ 484.925021][T31387] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.932282][T31387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.939825][T31387] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.946985][T31387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.029044][T31387] 8021q: adding VLAN 0 to HW filter on device bond0 [ 485.055823][ T3762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 485.071156][ T3762] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.080389][ T3762] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.096918][T31387] 8021q: adding VLAN 0 to HW filter on device team0 [ 485.117155][ T3762] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 485.126849][ T3762] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.134013][ T3762] bridge0: port 1(bridge_slave_0) entered forwarding state [ 485.168273][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 485.177961][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.185190][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.216920][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 485.228123][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 485.255679][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 485.264221][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 485.274156][ T3769] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 485.291276][T31387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 485.320394][T31387] 8021q: adding VLAN 0 to HW filter on device batadv0 05:25:36 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000340)={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x306}, 0x4, {0x2, 0x4e20, @empty}, 'netdevsim0\x00'}) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x7, 0x0, 0x0, 0x1a9e863, 0x0) 05:25:36 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) recvfrom$packet(r3, &(0x7f0000000340)=""/69, 0x45, 0x4, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_ex/ra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:36 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x3}, 0xfde1) [ 485.671746][T31403] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex/ra_isize=0x0000000000001000" or missing value 05:25:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_ex\\ra_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:37 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000200)='\x8fser\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)="f5", 0x1, r0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendmsg$rds(r3, &(0x7f00000008c0)={&(0x7f0000000280)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000480)=""/99, 0x63}, {&(0x7f0000000500)=""/109, 0x6d}], 0x2, &(0x7f0000000840)=[@rdma_args={0x48, 0x114, 0x1, {{0x1, 0x1ff}, {&(0x7f0000000580)=""/31, 0x1f}, &(0x7f0000000800)=[{&(0x7f00000005c0)=""/43, 0x2b}, {&(0x7f0000000600)=""/190, 0xbe}, {&(0x7f00000006c0)=""/131, 0x83}, {&(0x7f0000000780)=""/121, 0x79}], 0x4, 0x38, 0x8001}}], 0x48, 0x4048040}, 0x4000801) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000900)='/proc/capi/capi20ncci\x00', 0x40, 0x0) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000a40)=0xe8) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r9 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r9, r10, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r8, @ANYBLOB=',group_i', @ANYRESDEC=r10, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) write$FUSE_ENTRY(r4, &(0x7f0000000a80)={0x90, 0xfffffffffffffffe, 0x1, {0x3, 0x2, 0x80000000, 0x7, 0x4, 0x6, {0x4, 0x9000000, 0x8, 0x6, 0xc6b, 0x0, 0x9, 0x7, 0x5, 0x9141, 0xb87f, r7, r10, 0x6, 0x9b}}}, 0x90) ioctl$RTC_PIE_OFF(r3, 0x7006) sendfile(r2, r3, 0x0, 0xdd) sendto$ax25(r3, &(0x7f0000000000)="e0c976e126d6396e7c80abc176cf3c4b2d6facb6ba94", 0x16, 0x90, &(0x7f0000000340)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @null]}, 0x48) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r11, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x3, 0x422000) pipe(&(0x7f0000000180)) ioctl$VT_DISALLOCATE(r0, 0x5608) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff54, 0x0, 0x32da03b, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x100000, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xf6f7, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f00000000c0)) [ 486.122483][T31526] encrypted_key: insufficient parameters specified 05:25:37 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000001480)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x8001, 0x0, @remote, 0x401}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e24, 0x1, @empty, 0x7076}, @in6={0xa, 0x4e22, 0x7, @remote, 0x8}], 0x74) chdir(&(0x7f0000000280)='./file0\x00') ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @vbi={0x100000001, 0x100, 0x4, 0x0, [0x2, 0x8000], [0x40, 0x2], 0x139}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) bind$alg(0xffffffffffffffff, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x20100, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000001500)={{0x0, 0x0, @identifier="b6914957b9086a5ed90c05ed356aa4a9"}, 0x33, [], "b522845f47917928b0bb1c09e792eb14d50c36835d100981542e2c8d82ab0ca8e2ccdd2366d4a43a1b8b49d254ad7231323268"}) r4 = semget(0x2, 0x0, 0x40) semctl$IPC_RMID(r4, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000480)=""/4096, &(0x7f0000000000)=0x1000) [ 486.199059][T31528] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex\ra_isize=0x0000000000001000" or missing value [ 486.242532][T31526] encrypted_key: insufficient parameters specified 05:25:37 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x3}, 0xfde1) 05:25:37 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r2, &(0x7f0000000340)={0x4, 0x8, 0xfa00, {r5, 0xffff}}, 0x10) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 486.440950][T31544] EXT4-fs (sda1): Unrecognized mount option "debug_want_ex\ra_isize=0x0000000000001000" or missing value 05:25:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_ext%a_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:37 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x800, 0x0) getpeername$llc(r1, &(0x7f0000000280), &(0x7f0000000340)=0x10) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_RMID(r0, 0xc00000000000000) r1 = geteuid() r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r8 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r8, r9, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r7, @ANYBLOB=',group_i', @ANYRESDEC=r9, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) r10 = gettid() ptrace$setopts(0x4206, r10, 0x0, 0x0) tkill(r10, 0x3c) ptrace$cont(0x18, r10, 0x0, 0x0) ptrace$cont(0x18, r10, 0x0, 0x5) ptrace$cont(0x7, r10, 0x0, 0x0) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000100)={{0x9, r1, r4, r6, r9, 0x8, 0x6}, 0x80000000, 0x6, 0x5, 0x4, r10, 0x0, 0x4}) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 486.768244][T31558] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext%a_isize=0x0000000000001000" or missing value 05:25:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.', 'posix_acl_access\x00'}) [ 486.906510][T31568] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext%a_isize=0x0000000000001000" or missing value 05:25:38 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x3, 0x100000003, 0x4, {0x0, @pix_mp={0x0, 0x0, 0x32314d56, 0x0, 0x0, [{}, {0x0, 0x4}, {0x1}, {0x0, 0x5}, {}, {}, {}, {0x0, 0xfffffffffffffffc}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x42000, 0x0) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) r5 = accept4$unix(r4, &(0x7f0000000480)=@abs, &(0x7f0000000500)=0x6e, 0x800) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000640)={r2, r5, 0x40, 0xcb, &(0x7f0000000540)="ff9eaa25b972990b7a6066675a352d5b089ba7870c28af9c288ddd867d5258111105dadceb8f84089d873236e7506d7d5acde610f1e5ca423ee6dd3841a12deb76818666da196f6db717697626694ac27967c552324b93bc3f7461dc4e170e794d39e460617207cf7312bd5b0e849c05d6363fa39d41831a23fc70f5e21a5c30ee61e240a3f430c26501d5f691514f314cd01cfa04a273d0758b27fb86e34df1ff090b110a6a797a10d9bc690263eb698913286cc179e3c4551ab842e5121189d4d9d1d00428584b32c157", 0x7fffffff, 0x0, 0x1f, 0x8faa, 0x698, 0x1, 0x55, 'syz1\x00'}) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:39 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x4}, 0xfde1) 05:25:39 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {0x3f}], 0x0, 0x0, 0x0, 0x2}}}) r0 = socket$netlink(0x10, 0x3, 0x9) syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x200000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x3a3400, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000005c0)='&xev/llm-co\x9c{v\x8al\x00', 0x40, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000480)) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r2, 0x0, 0xdd) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x3}) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r3, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) write$binfmt_elf64(r7, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x100000001, 0x10000, 0x1, 0x4, 0x1, 0x2, 0x3, 0x2, 0x264, 0x40, 0x2d3, 0x9, 0x1, 0x38, 0x1, 0x1ff, 0xffff, 0x4}, [{0x6, 0x7ff, 0xfff, 0x7, 0xc75, 0x9, 0x8, 0x8}], "8bc1768a9d2d24930d323e523a17559c8f6700fa6679db2aeaedd5cf6c828f52b9264dc70be235ae1bbb5e424dbe1ddb2d8410c9cab5c668bfa155299603b50f21ea25ab2c3d250bd1b3a875b61f02c1f87d24cd0758063760df5997f8b6556e9af4cd78834e619cc726bc5237267a4adf93c0877eece53b39712fde5294af499bbe8dd924e80961c938f85e0344fc168a4a723a43e2f45a5240e53877c72d209814a693eebb2f81cfddc292574f24146774745d5b750ccaecfde75e748392d2de90132de85b10208aea611d00538f81d2700520ad5359768bb5f4f1fd1b71cdf279316462466d23b85133812117b4ccda007aa87a"}, 0x16d) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000000880)=[@in6={0xa, 0x4e22, 0x3, @mcast2, 0xe735}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0xa8, @empty, 0x80000001}, @in6={0xa, 0x1, 0x2, @loopback, 0x4000000000000}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x100000001, @rand_addr="9ff9d9adb2f69251f073b6211606755a", 0x6}], 0xc0) pipe(&(0x7f0000000540)={0xffffffffffffffff}) getsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000580), &(0x7f0000000840)=0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000380)={0x7, 0x7fff, 0x2}, 0xc) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r9, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_ext\\a_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:39 executing program 3: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000000)={'hwsim0\x00', {0x2, 0x4e24, @rand_addr=0x3}}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x8) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 488.776196][T31696] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext\a_isize=0x0000000000001000" or missing value [ 488.982568][T31807] EXT4-fs (sda1): Unrecognized mount option "debug_want_ext\a_isize=0x0000000000001000" or missing value 05:25:40 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x4}, 0xfde1) 05:25:40 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, 0x0, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000340)={r1, 0x86, 0x9e}, 0x0, &(0x7f0000000480)="ba533a19561b23226a84e6e0191e76818c85b018b62dca422a099bbb1ea43dd975c49fbb2fc233ac15001ce2e565ac67d772a9751c7a94e6aba6d31a6ad43c524b59c5a7ab0dc1b4d1fea2e9deeaf0648bbc7863af7d9fefc87768825f8ccb8722043121bb3efefe532d0aa53bfaeabc78fbf06663484b4988993676e8a531430ff45eba8191", &(0x7f0000000540)="e4c32fde603fae7f4bd9829e8d734e79bf0096deb08e5a81db497818394c580b37b4644ea5fb492433f89b21aca26ed11a4c6eb92cd31a860d112c1ebd1f6f2d89435a4c01b0a9fb59d10a4d0f9de347f1ade9e643dc4178b77ab1a5cf47961b7081b83366c668cad8ec46b4324cd4fa9f70ab8d5ec9f106d57ad2a7a40aef65c18e49721832656c16122e07ed3d39b859297dea3c502f44de3b92f7dfe9") keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000280)={@remote, 0x0, 0x2, 0xff, 0x4, 0x7, 0xe4de}, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffff8b84, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="ffecac06c08ff7d7bdf1af4cd861ceebf73f38c57450032c188e6ea492a88fff59d436a78353c8f11b08a818ff5c4f5c54a10eea5251e522cadf25fdf965a529817e00be5e63a6023f68d353bede467130cbf8472e9507c789edc03743359d4c1715b120fc2ef2c03dc7458129aee9f9e117340db5530dc48f9b1792af03aa479140c88b069c75cddba26d5f7bb26f1390cde82bf3bdc6761efdbfce19942872102e44983bd8e56cb44514a2ad52aedadfbd5709bdc8bdd865f68f6e5c6e1dcb", 0xc0}, {&(0x7f00000001c0)="f38c25b46c769a7672ad7d393c33e8cdecb14a14c270db76a9d08f6bac37898e565906ff1ba9f6a95551e0b195b4536b6e51bf9df41bb9c2ac445d64c340c94a342847ebcd19034fbbf74a7fdb34c28d", 0x50, 0x7e4}], 0x800, &(0x7f0000000400)={[{@noauto_da_alloc='noauto_da_alloc'}, {@noquota='noquota'}, {@acl='acl'}, {@grpjquota_path={'grpjquota', 0x3d, './file0'}}, {@nolazytime='nolazytime'}, {@abort='abort'}, {@barrier_val={'barrier'}}, {@nodelalloc='nodelalloc'}], [{@obj_role={'obj_role', 0x3d, 'ppp1GPL+'}}, {@uid_lt={'uid<', r0}}, {@appraise_type='appraise_type=imasig'}]}) 05:25:40 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000480)="f56a69ce3e2d0c520fc4a95415eae569f4fbf98e33a184229476f9b7b4ac70179c1e5db5632190f339305f5861fe952453a2235252d1faa8503caa366d5dba7c9d31e55b094921566b691eb0b1144d64f763b504037bd68c6f24817c3801e1b5c9b72497ceb3dd0cc3b6ffe7adb247a9adceb8fe26b14b311117d22c26b9a72611883f6599098a4bd3d1b0b3dd314d7cf48f04d472c24d4eedacc952d7f6b93dc82d866f705ae4ca030000000000000017333edf39da9c5d9e9f09a372be2ee849ada259c92bef263356578f523e111d327535e0bbdf829dc51a", 0xda, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000000)) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$VT_WAITACTIVE(r4, 0x5607) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r5, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extr%_isize', 0x3d, 0x1000}}], [], 0x700}) [ 489.431135][T31818] encrypted_key: insufficient parameters specified [ 489.468899][T31820] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000001000" or missing value [ 489.557747][T31873] encrypted_key: insufficient parameters specified [ 489.672185][T31932] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr%_isize=0x0000000000001000" or missing value 05:25:41 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x4000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x2, 0x40) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x3c) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$cont(0x18, r5, 0x0, 0x5) ptrace$cont(0x7, r5, 0x0, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$cont(0x18, r6, 0x0, 0x5) ptrace$cont(0x7, r6, 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000280)) r9 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ip_tabs\x00'/22) sendfile(r4, r9, 0x0, 0xdd) r10 = socket$netlink(0x10, 0x3, 0x9) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r10, r11, 0x0, 0xdd) r12 = socket$netlink(0x10, 0x3, 0x9) r13 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r12, r13, 0x0, 0xdd) r14 = dup(r12) ioctl$VIDIOC_G_JPEGCOMP(r14, 0x808c563d, &(0x7f0000000780)) 05:25:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x1010c0, 0x101) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:43 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x5}, 0xfde1) 05:25:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extr\\_isize', 0x3d, 0x1000}}], [], 0x700}) 05:25:43 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000480)=""/135) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:43 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x28141, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x5) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x9, 0x2, 0x1000}, 0x4) tkill(r1, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x5) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = openat$usbmon(0xffffffffffffff9c, &(0x7f0000000100)='/dev/usbmon0\x00', 0x10000, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000140)={r0, r3, 0x7}) faccessat(r0, &(0x7f00000000c0)='./file0\x00', 0x28, 0x0) 05:25:43 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) ioctl$BLKTRACESTOP(r3, 0x1275, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x7, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff9, 0x3ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x0, 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000980)='GPL\x00', 0xffffffff, 0x86, &(0x7f0000000ac0)=""/134, 0x1f00, 0x4, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0x3, 0x9, 0x7fffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r6, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0x3, 0x1}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x7fc, 0xfe1}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r7, 0x4) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=r7, 0x4) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x3c) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$cont(0x18, r9, 0x0, 0x5) ptrace$cont(0x7, r9, 0x0, 0x0) r10 = getpgid(r9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r12, 0x0) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = gettid() ptrace$setopts(0x4206, r14, 0x0, 0x0) tkill(r14, 0x3c) ptrace$cont(0x18, r14, 0x0, 0x0) ptrace$cont(0x18, r14, 0x0, 0x5) ptrace$cont(0x7, r14, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r17 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r17, r18, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r16, @ANYBLOB=',group_i', @ANYRESDEC=r18, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x5) ptrace$cont(0x7, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r20, 0x0) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r5, &(0x7f0000000800)=[{&(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000500)="4780018e6a86ed2dce0115c3712f053b61a5fef94009fdb3ef2b64614fa8c5f49158c7984be9a1f62ef966c3e6fa939b17f5357a42eebbd9c0329e3df585f14d0f9ec9b159fad1779f8be88c5633e621b89f6e606428f87c57f4003f7e69db464949d26951ac4b276c6ba586176770fd68bbcae171c5b2d89cffb1217b57c01cd88a7188fce8e55e91df236bf2d2f07f96522447566c7a0f5138547d6378fdf4b8663242e158c9391e0e59cde2bd71e47fe6c633fe83c6cfc2c97856225b3b080b9ee2d5a37f42f0797cda2f24c06ba55b8b50749bc127078fcfa9ca1efb0509bb513de37237", 0xe6}], 0x1, &(0x7f0000000780)=[@rights={{0x1c, 0x1, 0x1, [r1, r8, r1]}}, @cred={{0x1c, 0x1, 0x2, {r10, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r18}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r20, r21}}}], 0x80, 0x24040}], 0x1, 0x8000) r22 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r22, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 491.919949][T32060] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr\_isize=0x0000000000001000" or missing value [ 492.064977][T32169] EXT4-fs (sda1): Unrecognized mount option "debug_want_extr\_isize=0x0000000000001000" or missing value 05:25:43 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x5}, 0xfde1) 05:25:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) fsconfig$FSCONFIG_SET_STRING(r3, 0x1, &(0x7f0000000240)='\x00', &(0x7f0000000280)='syz', 0x0) sendfile(r0, r1, 0x0, 0xdd) ioctl$KDADDIO(r1, 0x4b34, 0x7) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r4, &(0x7f0000000000)="db088261af3fd5f91a922ac7", 0xeb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r5, r4}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = shmget$private(0x0, 0x2000, 0x80, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={@null, @null, 0x5, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null]}) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = accept$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000200)=0x1c) recvfrom$inet6(r3, &(0x7f00000003c0)=""/4096, 0x1000, 0x3040, &(0x7f0000000240)={0xa, 0x4e20, 0x52762090, @empty, 0x7ff}, 0x1c) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x6, 0x0) mknodat(r4, &(0x7f00000000c0)='./file0\x00', 0x2, 0x3) 05:25:43 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000280)={0x619b, "9cb1054c86d55d2216d7f0e7cd7bb0a2315ed509a07c75aa3969561690a07ac0", 0x259790ff99c042eb, 0x3}) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_%size', 0x3d, 0x1000}}], [], 0x700}) [ 492.559017][T32180] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_%size=0x0000000000001000" or missing value 05:25:43 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000280)='./file0\x00', 0x3, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="754ee5942193153900a3ecaa72402242842a564562177847", 0x18, 0xeae8}], 0x1000020, &(0x7f0000000480)=ANY=[@ANYBLOB="626c6f636b2d616c636f6361746f726865645f72e56c6f636174696f6e2c7461696c733d736d616c6c2c666f776e65723e00000000", @ANYRESDEC=r1, @ANYBLOB=',\x00']) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r2, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f0000000540)="11d2dea8ecd10c51fdb6f855ad0dcaafbf3bcfc097d70d10f4b5c5e6be4ce99018195aa955d3e4a636e75d50528bbf4a71db61d024cf83e8d404754339e7cfec3bbc1fd8368449431f16315c90c8c67b09c004c1969f57cd46e974333fe7b91140b4d72e25dce8b1516d55c2f0791d5d23a3640fb09239c9c9a00be00a19e44c6d309f2c52380b540eeac98e6b123b7f8f5c480f82a50c273ee573af197c43855eadf34135d44fdd294cd92b93b9f0a67e11ba1996c55b", 0xb7, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, 0x0, r2}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 05:25:44 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='\x9eIJ\xff\xff', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x38d, 0xfffffffffffffffe) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x58a34016, 0x3, 0x8, 0x0, 0x9, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x822}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) r8 = shmget(0x0, 0x4000, 0x9127c38124e60be0, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_INFO(r8, 0x3, &(0x7f0000000540)=""/1) ioctl$sock_SIOCSIFBR(r6, 0x8941, &(0x7f0000000500)=@get={0x1, &(0x7f0000000480)=""/103, 0x8}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x50e6}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000380)={r9, 0xf3, 0x5, 0x6, 0x7, 0x35b6}, &(0x7f0000000400)=0x14) r10 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) finit_module(r1, &(0x7f0000000040)='\x00', 0x2) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r10, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 492.828841][T32300] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_%size=0x0000000000001000" or missing value [ 492.844866][T32299] encrypted_key: insufficient parameters specified 05:25:46 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x140, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000280)) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000018c0)={0x9, 0x100, 0x800, 0x8}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000000), 0x0}, 0x18) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:46 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x6}, 0xfde1) 05:25:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_\\size', 0x3d, 0x1000}}], [], 0x700}) 05:25:46 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xe332, 0x100) sendmsg$inet6(r0, &(0x7f0000000400)={&(0x7f0000000280)={0xa, 0x4e23, 0x8, @local, 0x6}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000480)="2b6252f63e86f8313ae12204178d00a3c35864705e5d4ad01e1b750f61f6dd9f958eb5fed6295609e188b966f662bc8035880fd20ae72fda4b0abccc79ab6bf25dfb8b45aee04f7e5990bcbe37a4b2687f8e2b3328e394e8d0621fa17985a1bcc3f2ca88d73c5bfb4504d4e92da0fe36b0cc3e8dbe0eb310e35d67b382e67a2c38bc9cfac8baac1deae0aeab316b1a4172bfca0a1c18124435481162c7cb23d7de5b6e9f02e496698820d6240101337e", 0xb0}, {&(0x7f0000000340)="29dabf11a8c85f39805f86fbf8744b9f65bcb5a3e4a4a3452015c823383542b9b6f81c", 0x23}], 0x2, &(0x7f0000000540)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x57d1}}, @hopopts={{0x28, 0x29, 0x36, {0x89, 0x2, [], [@enc_lim={0x4, 0x1, 0x100}, @pad1, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1]}}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0xff, 0x3, [], [@calipso={0x7, 0x10, {0x7, 0x2, 0x1f, 0x7, [0x5]}}, @jumbo={0xc2, 0x4, 0x12}]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0xc, 0x6, 0x3, 0xfffffffffffffffd, 0x0, [@empty, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast1]}}}, @dstopts={{0x188, 0x29, 0x37, {0x0, 0x2d, [], [@calipso={0x7, 0x18, {0x6, 0x4, 0x0, 0xb3e, [0x1f, 0x8]}}, @generic={0x3, 0x24, "b5fa4fc8e17e97e90ee26e822b5db4c0eacc3f49e1e9e1ffd7c7bf3d5a099e0c28e818b5"}, @generic={0x37da, 0xe6, "01bbd1e17c37e9f259a72dbf33a8e61aa52abb146564a44eecd3523bc6263550cae15a320767b9f87868ad50dd925cce371b98f73c473e722fa236310a3fefe887cbedaad765f9850167679ee46ba9182662de403543c2ac4419fecb1678a818452cdc5cd0b265768fdb640935c73f6c565ca634c0656120e7c548d1e0b4df7d0f4e874f8da8a49785bee6abdddb800e02114a14b8cef83d6e637fee509d136b770ba87a801cf7bbd9db65f50449c1e081c5cb323c503b7f18ab5b9740fdd5b98d92520171724bdbdbfa5497cca4a947bd43247240bc7526dd5f19bea248a0111899c55b46a5"}, @generic={0x699a, 0x3c, "7950c3a105621e6a0fa9d1a66d3455a8c9f462c321f291217f483af294493977be7a08862ea0698085db56a3c890b67dc4cb349906216840b75b2a77"}, @padn={0x1, 0x1, [0x0]}, @ra={0x5, 0x2, 0x2}]}}}], 0x240}, 0x2008088d) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 494.957407][T32318] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_\size=0x0000000000001000" or missing value [ 495.131936][T32318] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_\size=0x0000000000001000" or missing value 05:25:46 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x6}, 0xfde1) 05:25:46 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, &(0x7f0000000280)) 05:25:46 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x9, 0x100000003, 0x0, {0xa, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) mount(&(0x7f0000000000)=@nullb='/dev/nullb0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x40000, &(0x7f0000000380)='user\x00') openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_i#ize', 0x3d, 0x1000}}], [], 0x700}) 05:25:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') [ 495.647357][T32448] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000001000" or missing value 05:25:47 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200140, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000280)=0x1, 0x4) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 495.797984][T32508] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i#ize=0x0000000000001000" or missing value 05:25:47 executing program 4: mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2051801, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) bind(r0, &(0x7f0000000080)=@x25={0x9, @remote={[], 0x0}}, 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_i%ize', 0x3d, 0x1000}}], [], 0x700}) 05:25:47 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) setsockopt$inet_udp_int(r3, 0x11, 0x67, &(0x7f0000000000)=0x800, 0x4) [ 496.118270][T32574] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000001000" or missing value [ 496.320801][T32685] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i%ize=0x0000000000001000" or missing value 05:25:49 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x300}, 0xfde1) 05:25:49 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) prctl$PR_SET_FPEMU(0xa, 0x2) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000000)) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file1\x00') syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:49 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x8}, 0xfde1) 05:25:49 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) keyctl$update(0x2, 0x0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000480)={0x3, 0x70, 0x6, 0x8, 0x3, 0x3, 0x0, 0x5e, 0x8, 0x8, 0xa1, 0x6, 0x5, 0x3, 0x4, 0x7fff, 0x10000, 0x3e, 0x67b, 0xb42, 0x0, 0x9, 0x7, 0x2, 0x400, 0x8000, 0x0, 0x37f, 0x1000000000000004, 0xfffffffffffffffc, 0x7, 0x81, 0x6, 0x1, 0x80000000, 0x844a, 0x6, 0x81, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f0000000340), 0xc}, 0x0, 0x7, 0x1525, 0x5, 0xa0, 0x1ff, 0xab7}) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x40) r2 = syz_open_dev$amidi(&(0x7f0000000380)='/dev/amidi#\x00', 0x9, 0x10000) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) r5 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r5) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000000c0)={r7}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000005c0)={r7, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r7, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(r4, 0x84, 0xe, &(0x7f0000000740)={0x0, 0x8, 0x8, 0x1, 0x80000000, 0x5d7, 0xffffffffffffffc7, 0x100000001, {r7, @in6={{0xa, 0x4e22, 0x10001, @local, 0x7fff}}, 0x8, 0x81, 0x20, 0x9, 0x7}}, &(0x7f0000000800)=0xb0) sendmmsg$inet_sctp(r2, &(0x7f0000000ec0)=[{&(0x7f0000000400)=@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000500)="6c7f8c4fb5374b0f9f10522b09777fbafd9354e990dfb72b518bd4b814b7f15962b9bc5a441bd9dd394097a0b32956d0f306595cfdc6676240c801ddfefe980d065a761a828969fdfbe2ff038f54bf6712db789cee61d7d12c2f50d78d53c098cd30580948707b893950f231254f09344763a6448ea87446b512ab88692d6b12e43729452bc7f789dc3cdb294b8687344ec4608d89c1ce1a37ecd0c02bc19820b8bee0ccc149e8ed328cbd74b32e783cb01daad8057e66d6fbb49cae163af549", 0xc0}, {&(0x7f00000005c0)="e78be6249570726f075faf1955be5520dc9f17", 0x13}, {&(0x7f0000000600)="d5031d40829c0d5a8ac23338e350a7f5597c7cafde4954c4e9f1fd2182d6167cc596c59ec14ec86a514f023c8ffaaf233cd64f5053841a2ef16c64470ea5a1f1982a7b6482c774b2930cad0c76d59b4e825510896828ac27506c7894388d6ffc3ffe9c1a8d3b0624e82c1cc2de0be72cecc7f1f8ea7c1a52005edf1317fa204c6fc20568b10604fe7242204f89ac0835b97ec184d5480521f1b859943438e7a776d60f99891e113cbe6c0f1629c04f71c63bf59e5cd7258a3d83", 0xba}, {&(0x7f00000006c0)}], 0x4, &(0x7f0000000840)=[@sndrcv={0x30, 0x84, 0x1, {0x8000, 0x7fff, 0x20a, 0x80008, 0x1, 0x7, 0x3, 0x9, r8}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}], 0x48, 0x4080000}, {&(0x7f00000008c0)=@in6={0xa, 0x4e21, 0x0, @loopback, 0x3ff}, 0x1c, &(0x7f0000000c00)=[{&(0x7f0000000900)="5c641625d36fef3298d72eddd534efde5741b35b8861811288f2d901b2864cdd2a", 0x21}, {&(0x7f0000000940)="98a939b03b648e38a1f0436a6f21fbacf0adbeda769e0111e1f224a5ac0c11a9d2b2244b158156caa4ddecd7a170fc8cbae0baf5dc3dd95767d9f7c770a375c20baa30cc0db028f9960b975d4060301d321d5aefd43b773e856f3d7dc3b342870721457b67f7fe9c1f5529940b8b08f4941dfdd07122872eb2ea34a9ffe0e38ffb059b4f40844b9f953f36830814a81b02c530eb9d083fbffbdd3758dd5ff4c7304a7d523b7c", 0xa6}, {&(0x7f0000000a00)="ab7e462499598d4befc7c842c7640a9ca69005e509c6775930f7fb53ed38759fd2cba6f4bfe91e174182d433101d4eae1be2facd3248e74f3091fa028bad2dc50628f799514f6a72b79735d3d774a0720de4e90df67cce9bc7a35aca34c8a12e4c5d4dcd1305c0cb3740cbe5b8d2d49b1930a9a79aba0125dcc181a1c8cae032d0b10352ea06cd7598eaa382267d878604189b2b4fa1184001688fc27abb694b41dced4f99d3291798d49555f967a6e0b92587ed89b8eeaf90da51b83f395fe7f83e92d921c1f005c38924f23fc971859bdb6c5844f6d0", 0xd7}, {&(0x7f0000000b00)="854c84acd2fd7f97d5b02921d4da3b341a430ce7f0300e7d1202feed4b2a966351f438d3058cb7da78ae9d98262125869b7b4f513d63c6ec6ba4a3a54b0fa4f71ca5d2a8d35ed01c958c53dcc387ef6882db0751dca8f91cb21922246d8409005d910bd2e622e3dba1899f4d8eced9f91dd98cc835aadac89dd23c7afb4954b00799332c20dd0e46899665189d2bbf254b71f30fb34a81f9f89511965053d9f78053d81ef92eca5760243ff82f088ca04175dc6b4e4e0ef20d676810da3d64cb837bb00353bc76e370dddfab297ac113f1829c7c6df0971f0614d9", 0xfd57}], 0x4, &(0x7f0000000c40)=[@dstaddrv6={0x20, 0x84, 0x8, @remote}], 0x20, 0x4000040}, {&(0x7f0000000c80)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000e80)=[{&(0x7f0000000cc0)="9eea9feaca94a2290e9fa6", 0xb}, {&(0x7f0000000d00)="4e71737ddc54d0b0b00d54b7c325db13abf446077926eb2d7f0b0842cb6c067dfbc86bbd72331c20688586388c6b775974c9359e2cf025a04767a1ed9379ec70938d5bf7f7ac9739690d75683e2c005abd937a1c766fe2d8c9233fa80627a7e61bdf7c25c6c13e2733b4f59e66d1", 0x6e}, {&(0x7f0000000d80)="593bb9007e677ed84c2c3599e0729fe02920ec362cc9c6ea111cf3cefe3ec8c76d142b935ddc71cd23ba7938a968ae861528eeb87f2fae91d5ae2a907126cd1411c525926d2648609986a2cc2309315576068c5fb7d28291d49a9e5bef517660a15ff0675aad46f01d1cdd264a3daab94de5ec1a1a9a0ca4131c2ec9ccb7cd21c7cdcb2e64e95b855dee0b19ba9a82ec030ef0d5a5b8402c8dcd91c524d09172670d9fcc7e6d11b1189d17327e8f275587e296a14d5003c554a05d3b3212e63621505947", 0xc4}], 0x3, 0x0, 0x0, 0x8}], 0x3, 0xc0) keyctl$dh_compute(0x17, &(0x7f0000000140)={0x0, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:49 executing program 4: r0 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@caif=@dgm, &(0x7f0000000000)=0x80, 0x800) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000140)=0xffffffffffff983a) mkdir(&(0x7f0000000080)='./file0\x00', 0xc) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a0a8b2, 0x0) 05:25:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_i*ize', 0x3d, 0x1000}}], [], 0x700}) 05:25:49 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000480)={r3}) r4 = accept$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000340)=0x1c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x7}, &(0x7f0000000400)=0x8) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r5, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x6, 0x5b, 0x1f}}, 0x28) [ 498.745404][ T345] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000001000" or missing value 05:25:50 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {0x800000}]}}}) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000a80)={0x7, @vbi={0x17b1, 0xffffffff80000000, 0x8, 0x0, [0x9, 0x2f14], [0x2, 0x80000000], 0x108}}) process_vm_writev(r2, &(0x7f0000000780)=[{&(0x7f0000000480)=""/212, 0xd4}, {&(0x7f0000000280)}, {&(0x7f0000000580)=""/197, 0xc5}, {&(0x7f0000000680)=""/213, 0xd5}, {&(0x7f0000000340)=""/101, 0x65}, {&(0x7f0000000400)=""/17, 0x11}], 0x6, &(0x7f0000000a40)=[{&(0x7f0000000800)=""/160, 0xa0}, {&(0x7f00000008c0)=""/252, 0xfc}, {&(0x7f00000009c0)=""/35, 0x23}, {&(0x7f0000000a00)=""/4, 0x4}], 0x4, 0x0) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r5, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r5, r6, r5}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 498.867742][ T411] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i*ize=0x0000000000001000" or missing value 05:25:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_i+ize', 0x3d, 0x1000}}], [], 0x700}) 05:25:50 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x22000, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000280)) [ 499.171379][ T467] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000001000" or missing value [ 499.364880][ T474] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i+ize=0x0000000000001000" or missing value 05:25:50 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x2, {0x0, @pix_mp={0x0, 0x0, 0x1818a3a1, 0x0, 0x0, [{}, {0x0, 0xfffffffffffffffe}, {}, {}, {}, {}, {}, {0x0, 0x6}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) connect$bt_l2cap(r6, &(0x7f0000000700)={0x1f, 0x4, {0x1, 0xfffffffffffff0f1, 0x39a, 0xb582, 0x6, 0x5}, 0x3}, 0xe) sendfile(r3, r4, 0x0, 0xdd) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000380)={@loopback, 0x0}, &(0x7f0000000400)=0x14) setsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000580)={@broadcast, @rand_addr=0x20000000000000, r7}, 0xc) r8 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r8, 0x0, 0x0) r9 = add_key(&(0x7f0000000480)='.reqhest_key_\x14\x00\x00\x00\x00W\x82\xd7\x0f\xaf\xe3i\xa9g\x01z\x9b\xfa\xe0:[\xd2D\'\xf4\xba\x8d\xe4Sk\x9a\x19\x0f\x81\r\x8ci5!\x04y\xc8\xba\x86\xe6>\xa3\xe9\xd2\xec7.v\xfe\xe98\x01', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000640)="e290355a5ffda3d4f4062605377e43f30b25b242caf6039fd901ab995f0454aef93a3d6eeaa1f487f5d1dff5008644f2fc6ace08e4322782b96cd30b79cbcea0dba72f9a81ca9ce6d6f06cb9fae7c11e884e09d481bcb820250c0cb3cc47b2455e5e6ce6194b95e77b07b15f479c384f30deb30ae9e6af47325afa43f59f1f7ea0595447caf8774226d98a88544e41d45f9555081085fe59e9ae0aecb837f89a3819f73640", 0xa5, 0xfffffffffffffffc) r10 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r10, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r8, r9, r10, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r2, 0x80045301, &(0x7f0000000280)) r11 = socket$netlink(0x10, 0x3, 0x9) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r11, r12, 0x0, 0xdd) ioctl$TUNSETLINK(r12, 0x400454cd, 0x30f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r13 = socket$netlink(0x10, 0x3, 0x9) r14 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r13, r14, 0x0, 0xdd) r15 = openat(r4, &(0x7f0000000d00)='./file0\x00', 0x0, 0x20) getsockopt$inet_IP_XFRM_POLICY(r15, 0x0, 0x11, &(0x7f0000000840)={{{@in=@dev, @in=@loopback}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000000)=0xe8) r16 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r16, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffddb, 0x0) [ 499.534789][ T481] encrypted_key: insufficient parameters specified [ 499.549941][ T481] encrypted_key: insufficient parameters specified [ 499.894120][ T486] encrypted_key: insufficient parameters specified [ 499.901415][ T481] encrypted_key: insufficient parameters specified 05:25:52 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x500}, 0xfde1) 05:25:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_i-ize', 0x3d, 0x1000}}], [], 0x700}) 05:25:52 executing program 4: r0 = socket$isdn(0x22, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x2) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000200)={0x1, r4}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x3, 0x0, 0x0, 0x1000000, 0x0) r5 = creat(&(0x7f0000000500)='./bus\x00', 0x99) syncfs(r5) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000000c0)={r7}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000005c0)={r7, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r7, 0x40, 0x30}, &(0x7f0000000040)=0xc) r8 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r8) setsockopt$inet_mreqn(r8, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r9, 0x84, 0x1, &(0x7f00000000c0)={r10}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r8, 0x84, 0xf, &(0x7f00000005c0)={r10, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) r11 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r11, 0x84, 0x72, &(0x7f0000000000)={r10, 0x20000009, 0x30}, &(0x7f0000000040)=0x4) r12 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r12) setsockopt$inet_mreqn(r12, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r13 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r13, 0x84, 0x1, &(0x7f00000000c0)={r14}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r12, 0x84, 0xf, &(0x7f00000005c0)={r14, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r14, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f00000002c0)={r14, 0x6, 0x30, 0x3, 0x3f}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000380)={r15, 0x10000, 0x8000, 0xfffffffffffffffd, 0x7, 0x9, 0x80000001, 0x1bc2, {r10, @in={{0x2, 0x4e24, @broadcast}}, 0x80011f, 0x2, 0x0, 0x3, 0x5}}, &(0x7f0000000080)=0xb0) sendto$isdn(r0, &(0x7f0000000100)={0x400, 0xac, "ba57f12834156ae81cbe3355582f28a273563737c80a34e13a08ae63e2e0ca430054f6228704c298a97b65fadb614761e3c39c74dfe5d26ef4e7a567ccfe2ec96d2eada3d7099e6686cdbf5fa735c722bf61f335dc7310770c0cae98b110d12e8b68bf46a1ba479cd96c1a8104a31eb4c77407bdafc540693654f749f1511b37694def8e14b272f26bb0cdd50b3c77d1e4d08e308793f7f8130e1e39f7ad0efaca7f960ff26c12f159eb55c309dd01f17c1d87cf265363b7610ecf3145083dbbe562c2fc1e7bf474faf2bfa93e3525780892cb23c6f61009c1d7ba4e23161acc7cf6538d7fa22696638389633698c35247910fdb3b"}, 0xfd, 0x800, &(0x7f0000000280)={0x22, 0xfffd, 0xcab, 0x7f, 0xfff}, 0x6) [ 501.090685][ T493] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000001000" or missing value [ 501.255017][ T602] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i-ize=0x0000000000001000" or missing value 05:25:52 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0xa}, 0xfde1) 05:25:52 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r3) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x1, 0x0) r5 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r5) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000000c0)={r7}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f00000005c0)={r7, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r7, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000380)={r7, 0x4, 0x9}, &(0x7f0000000400)=0x8) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f00000000c0)={r9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000005c0)={r9, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r9, 0x40, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000000)={r9, 0xffffffff, 0x6, 0x1, 0x100000000, 0x6}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r10, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:52 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fanotify_mark(r2, 0x40, 0x11, r3, &(0x7f0000000280)='./file0\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$KDMKTONE(r2, 0x4b30, 0x80000000) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffffffffffeaf, 0x0, 0x1a8a03b, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x900) 05:25:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_i.ize', 0x3d, 0x1000}}], [], 0x700}) [ 501.827389][ T615] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000001000" or missing value 05:25:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000600)={0x2, 0x8, 0x7, 0x800, 0xffffffffffffffff}) r5 = syz_open_dev$swradio(&(0x7f0000000640)='/dev/swradio#\x00', 0x1, 0x2) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x4000, 0x0) sendmmsg$unix(r1, &(0x7f0000000700)=[{&(0x7f0000000080)=@file={0x28ac2db3e1385f9d, './file0\x00'}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000100)="ee0e2a0712cb3ff7dd65e1bb0c8d99fef3922130309e2c95e6ec6d3f7d7f5ce3db3dc483b913c5ba6d1a7045d41b7bd0ab0b7a6f0356e4b530c27e23e00b9eeca957951968754c8f46a575762e2b30b33e9a49b31396d18c082d8ccd85e18859284e7c9f2618202474e437c6ef941729eb45829432ff6fd0b4d10e15296e8ac3bd2ef1665bcb6a11cd52768d510036287cb3391482f11e8bd4343723d7d385d2966bae3e5c82cce42f5d0c01d466e33462f4aee0c20a9d5e5b4fadad4a5c8fa081691e3ebbc5bd91d16986fc4226f844b9f138a7d92a167078e1696f23bc888a7aa63d611962555afc732f318f85b14afaf05c", 0xf3}, {&(0x7f0000000200)="b3bfab27de5d34241216c4cea2929b9638c123a61d20f741423cf71e66a320b010c67287fad75c178e947c125d0cc71ed97421599c0c494b2a83864644051b62d7aa84e050a7a8804230ec5d448c886104d4dd56250715ec8a7a42481ce9a03b088590bb19a59145ecc1af89c19e203252ecf748ae420fed460fb6a8ef87b7c0c06aa89661e789ccee92805c7506af0c61ea6a712e448988c13664812a8c106940630d6207b476a2c899b0d4761bebff13a6ebfa226318da0c53b84d8c77249a760f4efb4adb054d4d8e", 0xca}], 0x2, 0x0, 0x0, 0x40040}, {&(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000340)="b5600bcb69f0", 0x6}], 0x1, 0x0, 0x0, 0x8000}, {&(0x7f0000000480)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000500)="96d8ade7fe001152a50be9c2c37a822086c14ac969bb4ae2b87894bf21a464f38afb57738017e8a766cdb29f3d70cbad39a3e87758c1bc466a1040f3cbf076d73151fca408bc498295e6473734933c0a42074001a6d52ddf78886c4f2eb5df32e5ea727626322a44e054d0b9f23c4cc839d865882cc26bd0224d7a2ba99b7d7a2e8418db3603059c999efbcb785d94c192ade8950e5028746a8df99a9202", 0x9e}], 0x1, &(0x7f00000006c0)=[@rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [r2, r4, r5, r7, r8]}}], 0x38, 0x4080100}], 0x3, 0x40000) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:53 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r2 = add_key$user(&(0x7f00000003c0)='\a\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="99ffffff0001210ae5c79526e56f4b", 0xf, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 501.971977][ T627] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i.ize=0x0000000000001000" or missing value 05:25:53 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20\x00', 0x10000, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000480)={0x29, 0x4, 0x0, {0x5, 0xfffffffffffeffff, 0x1, 0x0, [0x0]}}, 0x29) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {0x400}, {}, {}, {}, {0x0, 0x6}]}}}) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x36c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000340)="7a683eb2d0e482a338cdad091637363d828ddc29e9461ded129555c8e79f6146d2b745108f19849e410e536fbdef202cd96b5e11bee854770094a6bf0e184ba067a0438ac0f6edf87170ae5b5cafa19e307bf22eb1c155107b17cc28a64b0a3ed3cf9e51d48d35d8673a55dc524fadfc34118599ea76e910c46cd4ca1a0c", 0x7e, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_i0ize', 0x3d, 0x1000}}], [], 0x700}) [ 502.360317][ T745] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000001000" or missing value [ 502.530646][ T752] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i0ize=0x0000000000001000" or missing value 05:25:55 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x600}, 0xfde1) 05:25:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000140)='\\em0\x00', 0x5, 0x4) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x5) ptrace$cont(0x7, r1, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x1, r1}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:55 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x80}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1010000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x68, r2, 0x400, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x5, @media='ib\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x4054018) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000004c0)={0x12, 0x20, 0x101, 0x20, 0x962, 0x3, 0x0, 0x0, 0x7f, 0x4, 0x3}, 0xb) 05:25:56 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x10}, 0xfde1) 05:25:56 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000280)=0x80000001) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x5) ptrace$cont(0x7, r2, 0x0, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000000)=r2) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_iXize', 0x3d, 0x1000}}], [], 0x700}) 05:25:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = accept$unix(r1, 0x0, &(0x7f0000000080)) recvfrom(r2, &(0x7f00000003c0)=""/4096, 0x1000, 0x40, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x2, @loopback}}, 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:56 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='u\x00\x04\x00\x10', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000380)="f5371d9f5122b60693bbf3d9be4a8bbc71ea9fa7f747", 0x16, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000280)={0x18, 0x1, 0x0, {0xe}}, 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000000)="02deb90656e6411606ba7fae7f5559f788ef359ddd7b8092e3ef0c13f34a3d18f4e894b890f94174b20bb92ca6b7ae32493cee6d0f80", 0x36, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 504.861539][ T775] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000001000" or missing value 05:25:56 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) getsockopt$llc_int(r2, 0x10c, 0x4, &(0x7f0000000280), &(0x7f0000000340)=0x4) 05:25:56 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x3, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}], 0x0, 0x0, 0x0, 0x1}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, &(0x7f0000000380)={0x18, 0x0, {0x0, @random="15d8d2a321d9", 'ip6gre0\x00'}}) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84000) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x0, 0x100, 0x0, 0x4, 0x0, 0x4, 0x100, 0x0, 0x2, 0x100000000, 0x9, 0x0, 0x8001, 0x3f, 0x4, 0x0, 0xffff, 0x3, 0x800, 0x1, 0x8000, 0x1f, 0x8, 0x7, 0x9f, 0x6c, 0x81, 0xe1, 0x5, 0x3, 0x40, 0x10001, 0x80000001, 0x0, 0x9, 0x90b, 0x0, 0x3ff, 0x2, @perf_bp={&(0x7f0000000340), 0x4}, 0x102c0, 0x7, 0x4, 0x1, 0x7, 0x8001, 0x316}, 0xffffffffffffffff, 0x9, r3, 0x2) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000280)) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000400), 0x8) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 505.008793][ T785] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iXize=0x0000000000001000" or missing value 05:25:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00 ', @ANYRES16=r2, @ANYBLOB="000227bd7000fbdbdf250400000014000900080001000706000008000200ffffffff1400090008000200060000000800010006000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x1, 0xfffffffffffffea1, 0x0, 0x80000, 0x0) 05:25:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_i\\ize', 0x3d, 0x1000}}], [], 0x700}) [ 505.408810][ T902] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i\ize=0x0000000000001000" or missing value [ 505.535689][ T907] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_i\ize=0x0000000000001000" or missing value 05:25:58 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = dup2(0xffffffffffffffff, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) write$FUSE_ENTRY(r3, &(0x7f0000000480)={0x90, 0x0, 0x2, {0x1, 0x1, 0xfffffffffffffffc, 0x0, 0x1, 0x400, {0x5, 0x7, 0x200, 0xffffffffffffff18, 0x6f, 0x4, 0x3e5f, 0x3, 0x5a, 0x2, 0x0, r5, r6, 0x0, 0x2}}}, 0x90) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r8 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r8, 0x6609) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r7, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:58 executing program 4: setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x2021001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:25:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_icize', 0x3d, 0x1000}}], [], 0x700}) [ 507.180702][ T919] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000001000" or missing value [ 507.335864][ T930] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_icize=0x0000000000001000" or missing value 05:25:59 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0xa0}, 0xfde1) 05:25:59 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x186a0}, 0xfde1) 05:25:59 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) rseq(&(0x7f0000000340)={0x0, 0x0, &(0x7f0000000400)={0x0, 0x1, 0x1000, 0xb9, 0x1f}}, 0x20, 0x0, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x305) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r5) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) poll(&(0x7f0000000380)=[{0xffffffffffffffff, 0x400}, {r4, 0x2020}, {r6, 0x2000}], 0x3, 0xffffffffffffff25) 05:25:59 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x6b) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000740)='/dev/sequencer\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000780)=""/4096, &(0x7f0000001780)=0x1000) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x80000001, 0x480200) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f00000001c0)={0xdd0f, 0x4, 0x5145, 0x1001, 0x2, 0x9}) move_mount(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xde) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r3, &(0x7f0000000200)="88dbfb1b57044242e71457a2a5ea6b87aa0bb71846343e0aed3d44be76a11e6193dfa31a4fd8339dd2e15b52d3bfc43c6675d1927e8f80abdaf5fb965e8d2f0c73a4ed2765c054386dd99bdc4af360c1a8275ca995531cc919952eb2c7e729ec48d8e55d3ab8e963db297d611ea82cdfe3b4ef7b690a59b3046982ff305067889e6d35f418eb08b5f4abf9980b2d98116e1e22c4118b092d0382ac2d2bbd6d18dc127d4795dcef8ad9c893b9a6257b3984328638d8319a0edc6c4880d1ad15f3deec7315994c272bd4"}, 0x20) 05:25:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_idize', 0x3d, 0x1000}}], [], 0x700}) [ 507.984941][ T1041] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000001000" or missing value [ 508.151350][ T1161] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_idize=0x0000000000001000" or missing value 05:25:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_iiize', 0x3d, 0x1000}}], [], 0x700}) 05:25:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7, 0x5e62, 0x0, 0x2048, 0x0) 05:25:59 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x50565559}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xa63d, 0x208000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000340)="f33823e79909b919e9743a2d9b6f7f09549d337d84aa6a628adb3e805992b142ef415fbaff5d44b841e639514f6c88e08c5fb442a40e5ff2ce30d5d2f64866292b984303f959f2dbc886b7", &(0x7f0000000480)=""/139}, 0x20) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:59 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @sliced={0x99e2, [0x1, 0x15ab, 0x5, 0x1f, 0x80, 0x5, 0x0, 0x7, 0x1, 0xc, 0x7, 0x3ff, 0x8001, 0x0, 0x71c3, 0x1, 0x1f, 0x8, 0xb087, 0x25, 0x2, 0x10001, 0x4, 0x3, 0x9, 0x2, 0x2, 0x2, 0x0, 0x0, 0x101, 0x5, 0x6, 0x100, 0x1ff, 0x10001, 0x40, 0x7, 0x6, 0x3, 0x8311, 0x5d, 0x1ff, 0x1ff, 0x2, 0x6, 0x4, 0x3], 0xfffffffffffffffc}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xae) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, 0x0, 0x0) r2 = add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000340)="8537458b0aa102f4e20a5098474db1a1c53d7599d77255a920b3dce7919d6d1a41919d01031bbee602b16caf0a88d8eb55c4ed4b7e031a52cb0a3a888184acca29ce469f668dc0", 0x47, r1) r3 = request_key(&(0x7f0000000400)='dns_resolver\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='\x00', 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r4, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r3, r4, 0x0) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r5, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) ioctl$DMA_BUF_IOCTL_SYNC(r7, 0x40086200, &(0x7f0000000500)=0x4) [ 508.517162][ T1173] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000001000" or missing value [ 508.576779][ T1182] encrypted_key: insufficient parameters specified 05:25:59 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000480)=""/216) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:25:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x9e) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000100)=""/106, &(0x7f0000000180)=0x6a) [ 508.680623][ T1182] encrypted_key: insufficient parameters specified [ 508.715039][ T1188] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iiize=0x0000000000001000" or missing value [ 509.223529][ T1182] encrypted_key: insufficient parameters specified [ 509.235196][ T1191] encrypted_key: insufficient parameters specified 05:26:02 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x140}, 0xfde1) 05:26:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_ilize', 0x3d, 0x1000}}], [], 0x700}) 05:26:02 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x26a, 0x10100) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000280)={0x1, 0x0, 0x101, 0x0, {0x7ff, 0xc5d, 0x8, 0x9}}) 05:26:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:02 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, 0x0, 0x0) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000480)="f926dd160a049e88726afb1e598dc144b8c97dbef873042745c59d1fd3293886f4d36343528504aa4ab0f012f60bb3082e240cfb6f0da1daf5501e2c97db8e6322eed8ebafced67ac0f624293231c0e7ae6a931e6a2a1daf69c0213d2ac09a8f4367ffc248a41cf28a988dae18faf7535b0e4412d0a905a361dc600d4b1407d95aabea65e9f00ef4abfa8fa541fd1ec5c4f630bdf60a8a72f8ae6aaba703070836125e", 0xa3, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r2, r0}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 05:26:02 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x19000}, 0xfde1) [ 511.112719][ T1319] encrypted_key: insufficient parameters specified [ 511.129992][ T1322] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000001000" or missing value [ 511.184960][ T1330] encrypted_key: insufficient parameters specified 05:26:02 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x8d4b5013364e26a8, [{0x0, 0x8}, {}, {}, {0x0, 0xfffffffffffffffc}, {0x0, 0xfffffffffffffffe}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000280), 0x4) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r3 = creat(&(0x7f0000000340)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000480)={0x4, 0x70, 0x3, 0x3, 0x7fff, 0x4, 0x0, 0x0, 0x423, 0x6, 0x200, 0x1, 0x7, 0x8001, 0xb9cb, 0x5, 0xc9cd, 0xb95f, 0x401, 0x5, 0xffffffffa0de430f, 0x9, 0x8, 0x4, 0x7f, 0x100, 0x7, 0xffff, 0x6, 0xe6, 0x8, 0x6, 0x1ff, 0x2, 0x3, 0x5, 0x800, 0x22dd, 0x0, 0xbf, 0x1, @perf_config_ext={0x4, 0x401}, 0x800, 0x1, 0x1000, 0x8f4dae14293f391, 0x80000001, 0xc5b, 0x5}) 05:26:02 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x2}, {}, {0x43}], 0x0, 0x0, 0x4}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) pipe2(&(0x7f0000000380)={0xffffffffffffffff}, 0x800) write$P9_RVERSION(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000000395032303030"], 0x13) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$BLKIOOPT(r4, 0x1279, &(0x7f0000000280)) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r5, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 511.267819][ T1333] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ilize=0x0000000000001000" or missing value 05:26:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x800) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_ioize', 0x3d, 0x1000}}], [], 0x700}) 05:26:02 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x104000003, 0x0, {0x4, @pix_mp={0x0, 0x0, 0x0, 0x6, 0x0, [{0x0, 0xbe67}, {}, {}, {}, {0x0, 0x4}, {0xfffffffffffffffc}, {}, {0x0, 0x5}], 0x0, 0x0, 0x8}}}) r0 = add_key$user(&(0x7f0000000200)='us\f\xc0\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000000)="f51bd21cff0100005f6ab896a4", 0xd, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 511.642414][ T1457] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000001000" or missing value 05:26:03 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) [ 511.833245][ T1467] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ioize=0x0000000000001000" or missing value 05:26:05 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x300}, 0xfde1) 05:26:05 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000280)=""/53) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_ipize', 0x3d, 0x1000}}], [], 0x700}) 05:26:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xfaf, 0x44ac80) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:05 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0xe521, 0x0, 0x0, 0x0, 0x0, 0x1bac1bb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000140)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000000c0)=0xe8) sendmsg$xdp(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000300)={0x2c, 0x4, r4, 0x14}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000340)="f37592b82765c44a702bc5170f6b382db93b64a2a00e487ebcf6ec3587a30d3d3f8cadfbfdea4dbf8c41c59c1b41d0745b04fb1f7a88ffc8b7cca910fdd2fd9961bf3c4b68bda85238ee8be9bb511dedd84a6b1dcf4d1d01608ef3221414d5cd4c94417863efaba09e18347858ce919a97c761c4e2c46cf140a9872d72f46fe1e3e7f8cdf3667ac3e0017a79a5331170cdeb62406872ccd4a4710458cae93c042d0c242d86ed6e4361c05fc3c445c40cd6020e6c66ebb566654797d42ee19645fdca6b3c254f988d3f36f279e0f17ae09624d5fda31931cef0b33526db87a8935ce70522ff", 0xe5}, {&(0x7f0000000440)="d34685bcc28ad1530bbdc97f93e81debf4f365dbd5eb92de9db0755c6a01d5fb89dbe28a376fdb51aba243e9439432e1a103ae5b3ef61eea13c1133157588b4f8d8beec6df0af197455694376fe27dd97d1c7559cb3fe9109b0a10cb4c65bb6e7fcb730e343bc59ddac231593f1c8c160499f4f23a604c950635292d9bda0a7c5e2cf788f1cb78c96efc4789d9eedd812f0e5f74642930bf396f3554cfd1ee9915ffbd272aa53a447fcbc162d3", 0xad}, {&(0x7f0000000500)="cfa23a7f70c44b20902bfd2b0850368e18a2f80d3118ac3cdf72da19bd2783534a39b30d28386d02c49bd9822fab4816d36292785143b2b6b7a6cfc355cae7a839e542360355b4d14185a40e1998fcb8a77f00b9754ebf572dfd411dc299d918bb409174a3960d77664b4d28911439f1a08cbfa448fef905f866fa31d9b15fc52e29a1f6c64cfe452a36c3c006e275fbab564154ff2bfd061802afe9184bc95ffcbf96eb9f0c6d9ca8d17bdaabde2796f5197e75fe5c6a7eea2f5107b0a52f0e05f2b71260a220b9", 0xc8}, {&(0x7f0000000600)="58be0366fc42c9b0045e738e06d06ad8ca3ce459c7724a627e2bfe09b7561bf8447326ad6ac3f4aa7bb6359e8bc3348fb0dccf9aa666be10bbfa273e9b04bb17291f7ce0abb75b8bf6d08eb1246afc49cc792652971d0cc40d2206e6f8d121ea3d0968c7216c7eb10bdbb9d204ca255fbb469b9d88bf5b90056c", 0x7a}], 0x4}, 0x40) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast1, @in6=@mcast1, 0x4e22, 0x0, 0x4e21, 0x5, 0x2, 0x20, 0x446e63df5772c870, 0x0, r4, r5}, {0x4, 0xfffffffffffffff8, 0x6, 0x1ff, 0x1, 0xfffffffffffff000, 0x7ff, 0xfffffffffffffffd}, {0x100000000, 0x6b79, 0x7, 0xffffffffffffff13}, 0x4, 0x6e6bb6, 0x5, 0x0, 0x0, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0x1fe}, 0xa, @in6=@remote, 0x3506, 0x1, 0x2, 0xffff, 0x800, 0x5, 0xffff}}, 0xe8) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:05 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x20000}, 0xfde1) [ 514.190780][ T1597] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ipize=0x0000000000001000" or missing value 05:26:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_iuize', 0x3d, 0x1000}}], [], 0x700}) 05:26:05 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x1, 0x2, 0x0, 0x0, 0x4000, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x80000000008, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe1, 0x0, @perf_config_ext={0x5, 0x169}, 0x30001, 0xfffffffffffffffd, 0x0, 0x6, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:05 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x4, [{}, {}, {}, {0xfffffffffffffffd, 0x8000}]}}}) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x26ce, 0x10000) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x8}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000004c0)={r6, 0x2c, &(0x7f0000000480)=[@in6={0xa, 0x4e20, 0x0, @rand_addr="b4d85d3a9269cb6d24f295dd40e6853e", 0x5}, @in={0x2, 0x4e22, @local}]}, &(0x7f0000000500)=0x10) r7 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000540)) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r7, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r8 = socket$netlink(0x10, 0x3, 0x9) r9 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r8, r9, 0x0, 0xdd) ioctl$VIDIOC_G_TUNER(r9, 0xc054561d, &(0x7f0000000340)={0x401, "08c9c9ced3a5c248ccbc61177f739b6e34e0740fce9c93b6d70d72e4d7cf47fd", 0x3, 0x40, 0x9eb, 0x6, 0x2, 0x2, 0x3, 0x4}) 05:26:05 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x41) sendto$rose(0xffffffffffffffff, &(0x7f0000000100)="d1cb146cfd3a802c149e5e0f53240feed34ee6793fceeacc85de11f6d1c4014d955ddd3d2338a3c1552e13e2c2e64052f28ef1b77ff0bdf46b870edf27da995b92859d21a06d6306a15559a3c7d56a5f97673aaccb5db6612a2aa84abf9a84bf6995a2deeede72824839d6369497a40ff8054e47471a67c38ed38e72edd85c9272cd286d2db531c9d7623933624a3bba28144446eee7d6561b3d9e33b0b4e7f6c120941fd1f48558d2b920f2117f", 0xae, 0x4000, &(0x7f0000000080)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @default}, 0x1c) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 514.769526][ T1729] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iuize=0x0000000000001000" or missing value 05:26:06 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0xfffffffffffffffc, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {0x4, 0xf5}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) getsockname$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x10) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd32, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xbf8, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffff7ffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 514.936598][ T1781] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_iuize=0x0000000000001000" or missing value 05:26:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvfrom(r0, &(0x7f0000000080)=""/99, 0x63, 0x40001040, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x4, 0x3, 0x3, 0x0, {0xa, 0x4e20, 0x9, @loopback, 0x40}}}, 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:08 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x500}, 0xfde1) 05:26:08 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x20800}, 0xfde1) 05:26:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_ixize', 0x3d, 0x1000}}], [], 0x700}) 05:26:08 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000340)=""/81, 0x51) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x1c) 05:26:08 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$VIDIOC_S_MODULATOR(r2, 0x40445637, &(0x7f0000000340)={0x800, "be0e51ffee238d58750fffc7ad5814493e6c92c0df458b8f18dd9c2f91b7aa90", 0xab0, 0x81, 0x8, 0x4}) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x1, 0x8f, 0x0, 0x239a028, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f0000000100)={0x0, {r3, r4+10000000}, 0xa9, 0x6}) 05:26:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)="4fb30528997c358e6ca8108066b51a33147c579f28ad54bcd1a945d4117c34e695e3caaf5c4be6e94fdc4e5a0ad975e5658f50b8cb5f28f33d526892501b6324c16c7bda771823b25427572fd5667600c1c8a41c0120d70aa7a2014997471465e77e66db") syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 517.419025][ T1984] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000001000" or missing value [ 517.540481][ T1992] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_ixize=0x0000000000001000" or missing value 05:26:08 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x400000000, 0x100000000, 0x0, {0x0, @sdr={0x44495658, 0x20}}}) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xa000, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000040)={0x1, 0x0, [{0xd, 0xfffffffffffffffa, 0x2, 0x7, 0x101, 0xffff, 0x1}]}) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, &(0x7f0000000240)="db40951195b6532950", 0x9) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:08 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000280)={0x8b63ba4a77198d7e, r5}) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0xf}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_is%ze', 0x3d, 0x1000}}], [], 0x700}) 05:26:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x296100d, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="6f5f000000db112be32e0000"], &(0x7f0000000140)='\x00', 0x1, 0x2) 05:26:09 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000000)="db2950a8dc33caed76a7880600000000a604b39400"/37, 0x25) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) sendto$unix(r2, &(0x7f0000000240)="0fd064002f4df04652705866328a8204e1d9aa7775cdb4e934385e7047c80f26eea52dcdea8050fc9e4fd8baf10f28085caeafcb7941e06cc666a106298f6ab68a1c68b407ebd32849873b53e00fb262a609f137cb0196ad412d32f54e3acdd5fcf713d93d6bc5", 0x67, 0x10, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 517.990807][ T2112] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is%ze=0x0000000000001000" or missing value [ 518.140515][ T2125] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is%ze=0x0000000000001000" or missing value 05:26:11 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x600}, 0xfde1) 05:26:11 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) ioctl$CAPI_INSTALLED(0xffffffffffffffff, 0x80024322) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) write$P9_RRENAME(r1, &(0x7f0000000000)={0x7, 0x15, 0x2}, 0x7) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_is\\ze', 0x3d, 0x1000}}], [], 0x700}) 05:26:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) connect$llc(r1, &(0x7f0000000080)={0x1a, 0x285, 0x2, 0xed85, 0x9, 0x6, @local}, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') r3 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000140)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000000c0)=0xe8) sendmsg$xdp(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000300)={0x2c, 0x4, r4, 0x14}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000340)="f37592b82765c44a702bc5170f6b382db93b64a2a00e487ebcf6ec3587a30d3d3f8cadfbfdea4dbf8c41c59c1b41d0745b04fb1f7a88ffc8b7cca910fdd2fd9961bf3c4b68bda85238ee8be9bb511dedd84a6b1dcf4d1d01608ef3221414d5cd4c94417863efaba09e18347858ce919a97c761c4e2c46cf140a9872d72f46fe1e3e7f8cdf3667ac3e0017a79a5331170cdeb62406872ccd4a4710458cae93c042d0c242d86ed6e4361c05fc3c445c40cd6020e6c66ebb566654797d42ee19645fdca6b3c254f988d3f36f279e0f17ae09624d5fda31931cef0b33526db87a8935ce70522ff", 0xe5}, {&(0x7f0000000440)="d34685bcc28ad1530bbdc97f93e81debf4f365dbd5eb92de9db0755c6a01d5fb89dbe28a376fdb51aba243e9439432e1a103ae5b3ef61eea13c1133157588b4f8d8beec6df0af197455694376fe27dd97d1c7559cb3fe9109b0a10cb4c65bb6e7fcb730e343bc59ddac231593f1c8c160499f4f23a604c950635292d9bda0a7c5e2cf788f1cb78c96efc4789d9eedd812f0e5f74642930bf396f3554cfd1ee9915ffbd272aa53a447fcbc162d3", 0xad}, {&(0x7f0000000500)="cfa23a7f70c44b20902bfd2b0850368e18a2f80d3118ac3cdf72da19bd2783534a39b30d28386d02c49bd9822fab4816d36292785143b2b6b7a6cfc355cae7a839e542360355b4d14185a40e1998fcb8a77f00b9754ebf572dfd411dc299d918bb409174a3960d77664b4d28911439f1a08cbfa448fef905f866fa31d9b15fc52e29a1f6c64cfe452a36c3c006e275fbab564154ff2bfd061802afe9184bc95ffcbf96eb9f0c6d9ca8d17bdaabde2796f5197e75fe5c6a7eea2f5107b0a52f0e05f2b71260a220b9", 0xc8}, {&(0x7f0000000600)="58be0366fc42c9b0045e738e06d06ad8ca3ce459c7724a627e2bfe09b7561bf8447326ad6ac3f4aa7bb6359e8bc3348fb0dccf9aa666be10bbfa273e9b04bb17291f7ce0abb75b8bf6d08eb1246afc49cc792652971d0cc40d2206e6f8d121ea3d0968c7216c7eb10bdbb9d204ca255fbb469b9d88bf5b90056c", 0x7a}], 0x4}, 0x40) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000002800)={@local, @initdev, 0x0}, &(0x7f0000002840)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000002880)={@rand_addr, @empty, 0x0}, &(0x7f00000028c0)=0xc) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) clock_gettime(0x0, &(0x7f0000005200)={0x0, 0x0}) recvmmsg(r8, &(0x7f0000005100)=[{{&(0x7f00000029c0)=@vsock, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000002a40)=""/107, 0x6b}, {&(0x7f0000002ac0)=""/61, 0x3d}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/179, 0xb3}], 0x4, &(0x7f0000003c00)=""/68, 0x44}, 0x200}, {{0x0, 0x0, &(0x7f0000003d40)=[{&(0x7f0000003c80)=""/130, 0x82}], 0x1, &(0x7f0000003d80)=""/118, 0x76}, 0x9}, {{&(0x7f0000003e00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003e80)=""/95, 0x5f}], 0x1, &(0x7f0000003f40)=""/80, 0x50}, 0x1}, {{&(0x7f0000003fc0)=@tipc=@name, 0x80, &(0x7f00000040c0)=[{&(0x7f0000004040)=""/75, 0x4b}], 0x1, &(0x7f0000004100)=""/4096, 0x1000}, 0x1}], 0x4, 0x40, &(0x7f0000005240)={r9, r10+10000000}) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000005280)={@local, @multicast2, 0x0}, &(0x7f00000052c0)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f00000054c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100011}, 0xc, &(0x7f0000005480)={&(0x7f0000000700)=ANY=[@ANYBLOB="5c010000", @ANYRES16=r2, @ANYBLOB="00012cbd7000fedbdf250200000008000100", @ANYRES32=r4, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB="080007000000000008000100", @ANYRES32=r6, @ANYBLOB="f40002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="40000100240001006c625f74785f0600738c99685fb2fb5b79000000006d617070696e67000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004002cd50000"], 0x15c}, 0x1, 0x0, 0x0, 0x44001}, 0x80000) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xfb, 0x0, 0x1a8a03b, 0x0) 05:26:11 executing program 3: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000340)="b2", 0x1, 0xfffffffffffffffb) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r1, 0x0, 0x0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r2, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000380)={r0, r1, r2}, &(0x7f0000000400)=""/9, 0x9, &(0x7f00000004c0)={&(0x7f0000000480)={'digest_null-generic\x00'}}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {0x101}]}}}) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:11 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x30000}, 0xfde1) [ 520.479940][ T2245] encrypted_key: insufficient parameters specified [ 520.505071][ T2246] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is\ze=0x0000000000001000" or missing value [ 520.524712][ T2245] encrypted_key: insufficient parameters specified 05:26:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 520.633830][ T2346] encrypted_key: insufficient parameters specified [ 520.669526][ T2245] encrypted_key: insufficient parameters specified [ 520.732769][ T2358] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_is\ze=0x0000000000001000" or missing value 05:26:12 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x212100) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000480)={0x0, @bt={0xc6, 0x98d, 0x0, 0x1, 0x0, 0x40000000, 0x1, 0xd0, 0x7fffffff, 0x1, 0x8, 0x4, 0x1000, 0xdf6, 0x2, 0x20}}) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r4) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000005c0)={r6, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r6, 0x40, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000280)={r6, 0x5}, 0x8) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r7, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isi\\e', 0x3d, 0x1000}}], [], 0x700}) 05:26:12 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x8, 0x0, [{}, {0x4000000}, {0x0, 0x20}], 0x0, 0x0, 0x7, 0x0, 0x4}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:12 executing program 3: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000280)='./file0\x00', 0x9ad, 0x3, &(0x7f0000000340)=[{&(0x7f0000000480)="539c144d3f09b8a09ea8baf4bd7dffccc06dfc94d0f77cbc96c5b3a2263d0ab7de81d79fdf6aaf532d51e66e922475f8b5e4e1f6a10c23a4219b92e344cddf2751fd7fea2f1781b8314cc8558e1d18c3aae08d19da536a0ef2660041954ec2410885a025affe1969e62d23d9b3e38052cf33b8edafcf6d4f4201458f516e9e8c9a029f909ee776ab7cdc6afc2ef240983dd844ee65b611ee26604669ad709bb02d45f83be2f3a56aa7941d6a92b9b65e3f2f20f07eee313f2788776462", 0xbd, 0xfffffffffffffe00}, {&(0x7f0000000540)="b9ca8849be84a529cf73d5bf805f2b36ae4cd1c4e2322cdddb9177d92179e9ef02a372653219e803811f4e3463521662d6bced799374a0fea165d508f718ba348f5959552496e29d7c29746ebb6923b00179dd8c60f579394c2252068589e0a65a0973718b659482a9f02a9a412e19813471b36bad470a6528907396c1d43d096280fb9712aeeaddcfbb3ae0eba39e8369737de2b70f76472d358d966ffc9e97bcef784d6f4d747f071ebc48ffa8162f218343fc22d345328891d6127f20be7131678311a1e24a50e4cc96776e6ba7b03d77f3cc09f78e6d869174730b68c3", 0xdf, 0xffffffffffffffec}, {&(0x7f0000000640)="a1bdc2556d7c1253a2d89d321c8c206dfd57ab4cb6e6d8f802bb5f2e24878fe5d959914301bd1aacfb16c0201d9da848913f77a952f90329d27fab7aba240bf4d268651150f49735a7c555edc86f9350b40b7f1fdeecb0634a3bd46eb08acd082c578b9343d2ee02a51fdd3a1666c747244a9c942696d67c11c2d8de8f8fa51d2c048c079f90aeba8396a4f17eaf", 0x8e, 0x9}], 0x1000000, &(0x7f0000000400)={[{@nouser_xattr='nouser_xattr'}, {@inline_xattr='inline_xattr'}], [{@smackfshat={'smackfshat', 0x3d, 'user\x00'}}]}) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 521.045612][ T2440] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi\e=0x0000000000001000" or missing value 05:26:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x80c000, &(0x7f0000000100)={[{@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x7f}}, {@mode={'mode', 0x3d, 0x4d}}, {@mode={'mode', 0x3d, 0x870}}], [{@appraise_type='appraise_type=imasig'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x64, 0x5a, 0x67, 0x37, 0x0, 0x61, 0x1], 0x2d, [0x33, 0x2, 0x35, 0x63], 0x2d, [0x32, 0x32, 0x369068823bf1ccb, 0x30], 0x2d, [0x65, 0x63, 0xd2, 0x65], 0x2d, [0x37, 0x64, 0xb4d61e609a2e757b, 0x63, 0x38, 0x51, 0x39, 0x5d]}}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, '[:%'}}, {@smackfshat={'smackfshat'}}, {@obj_user={'obj_user', 0x3d, 'vmnet1'}}]}) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:scanner_device_t:s0\x00', 0x26, 0x1) r0 = accept4$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x0, @local}, &(0x7f0000000300)=0x10, 0x80800) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x888100, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 521.179634][ T2479] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isi\e=0x0000000000001000" or missing value [ 521.248093][ T2485] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 521.256689][ T2485] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 521.282414][ T2485] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 521.303665][ T2485] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 05:26:14 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0xa00}, 0xfde1) 05:26:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isiz%', 0x3d, 0x1000}}], [], 0x700}) 05:26:14 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r4) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000005c0)={r6, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r6, 0x40, 0x30}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000000)={r6, 0x7}, 0x8) 05:26:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file1\x00', 0x0, 0x10}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r3, 0x660c) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) r7 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x20000, 0x0) renameat(r6, &(0x7f00000001c0)='./file0\x00', r7, &(0x7f0000000240)='./file1/file0\x00') ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$cont(0x18, r2, 0x0, 0x5) connect$unix(r1, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e) ptrace$cont(0x7, r2, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000100)={0x8, 0x3966, r2, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x33d}) 05:26:14 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) openat$cuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8, 0x200) setsockopt$inet_tcp_int(r2, 0x6, 0x2c, &(0x7f0000000280)=0x6, 0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xef1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0xdd) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f0000000380)={0x30, 0x5, 0x0, {0x0, 0x2, 0xffffffffffff0001, 0xfffffffffffffffa}}, 0x30) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'hsr0\x00', @ifru_map={0x1000006, 0x100000000, 0x8, 0x9, 0x1000, 0x8}}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:14 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x7fe00}, 0xfde1) [ 523.527833][ T2618] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000001000" or missing value [ 523.710840][ T2689] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz%=0x0000000000001000" or missing value 05:26:15 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix={0x2, 0x1, 0x494e4f4b, 0x4, 0x8f20, 0x3, 0x8, 0x647, 0x0, 0x8, 0x0, 0x2}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) sendto$rxrpc(r2, &(0x7f0000000340)="c303b0354ac590c6c81e9edaa39c4107ed8279aa410bad59b9b5a4d3fd0df8d88b5f2df3b4d3b52f76b3513ba4ee97a2c1d55ec29ee8b30917353054f5aa6cf28282fc8950e66a745208cb22bffb392944243f5020", 0x55, 0x800, &(0x7f0000000000)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e23, @local}}, 0x24) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isiz\\', 0x3d, 0x1000}}], [], 0x700}) 05:26:15 executing program 4: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x8, 0xffffffffffffff7f, 0x0, 0x80, 0xd25}, &(0x7f00000000c0)=0x14) keyctl$describe(0x6, 0x0, &(0x7f0000000140)=""/152, 0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={r2, 0x8}, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x44000, 0x0) [ 524.016933][ T2756] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz\=0x0000000000001000" or missing value 05:26:15 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x338, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 524.207789][ T2794] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isiz\=0x0000000000001000" or missing value 05:26:15 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000340)='user\x00', 0xfffffffffffffff9) keyctl$get_security(0x11, r1, &(0x7f0000000480)=""/173, 0xad) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, 0x0, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25, 0x1000}}], [], 0x700}) [ 524.538797][ T2881] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000001000" or missing value [ 524.656842][ T2888] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000001000" or missing value 05:26:17 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x2000}, 0xfde1) 05:26:17 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x33) 05:26:17 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) r5 = socket$kcm(0x29, 0x0, 0x0) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) r9 = socket$netlink(0x10, 0x3, 0x9) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r9, r10, 0x0, 0xdd) r11 = socket$netlink(0x10, 0x3, 0x9) r12 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r11, r12, 0x0, 0xdd) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r14 = socket$netlink(0x10, 0x3, 0x9) r15 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r14, r15, 0x0, 0xdd) r16 = signalfd(r14, &(0x7f0000000540)={0xffffffffffffffff}, 0x8) r17 = socket$inet6(0xa, 0x4, 0x80000000) r18 = socket$netlink(0x10, 0x3, 0x9) r19 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r18, r19, 0x0, 0xdd) r20 = socket$netlink(0x10, 0x3, 0x9) r21 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r20, r21, 0x0, 0xdd) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000700)=ANY=[@ANYBLOB="0300000000000000051bf7694f9b9bfee817e20fb3299c00", @ANYRES32=r3, @ANYBLOB="000000000a050000ffff00000000000000005b169e59000000000000", @ANYRES32=r5, @ANYRESHEX, @ANYRES32=r6, @ANYBLOB="000000000600"/28, @ANYRES32=r8, @ANYBLOB="000000000200"/28, @ANYRES32=r9, @ANYBLOB="000000000600"/28, @ANYBLOB="b8e905", @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[], @ANYRESHEX=r21, @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRES16, @ANYRES16, @ANYBLOB="daaf2f2100607bcd1bb1b6c54af32e14b5a4ca94fd9111f127031ae8b5047b7aca07257709961d42e3eac647b24f1644ade82e351836175acaf4b201b2981f25172be2884770e31deee0a826223f20fc3ceb94e35f5abacee44cac8e2654590d649f3429e841f4de635e0da710066a0d65012a484f584342c1f3", @ANYPTR], @ANYRES32=0x0, @ANYRESOCT=0x0], @ANYRES32=r13, @ANYRES32=r19, @ANYRES32=r16, @ANYBLOB="0000000001000100"/28, @ANYRES32, @ANYBLOB="000000000200"/28, @ANYRES32=r17, @ANYBLOB="00000000020000000000000000000000000000000000000000000093d5f76c894e85aec34ab700"]) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r22 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r23 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x800) ioctl$EVIOCGMTSLOTS(r23, 0x8040450a, &(0x7f0000000480)=""/130) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r22, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = creat(&(0x7f0000000240)='./bus\x00', 0x0) syncfs(r4) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000440)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}, 0x4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f00000000c0)={r6}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000005c0)={r6, @in={{0x2, 0x4e24}}, 0x2, 0x7fff, 0x3, 0x0, 0xe66}, &(0x7f0000000680)=0x98) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r6, 0x40, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f00000001c0)={r6, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, [0x0, 0x1, 0x2, 0xffffffffffffffe0, 0x4, 0x1, 0x100000000, 0x2c, 0x0, 0x40, 0xa38, 0x1, 0x1076660c, 0x641, 0x20]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000300)={r7, 0x401}, &(0x7f00000003c0)=0x8) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x16e, 0x0, 0x1a8a03b, 0x0) r8 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2000, 0x0) r9 = socket$netlink(0x10, 0x3, 0x9) r10 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r9, r10, 0x0, 0xdd) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r9, 0xc0506617, &(0x7f0000000100)={{0x1, 0x0, @descriptor="491db8a3f54cdded"}, 0x5a, [], "c353c5e38447118e4f37ff4a604be39cd0118b118d866027e8e4166d3da1f9c6576975f65b89332660dc89d9cf1585685e8c56cff2e1feb0afb150b0fe7c2b2b753d6bbe6179e4d8b6d289d77c72a26fa24b0bc7d4c054b61311"}) fspick(r8, &(0x7f00000000c0)='./file0\x00', 0x0) 05:26:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8}}], [], 0x700}) 05:26:17 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x80000}, 0xfde1) [ 526.608326][ T2900] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000008, [ 526.696237][ T2908] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000008, 05:26:18 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000480)="3af7c6e66ecb591f12c3088485d11e4f9f78f8896e3a90e2e85f1d2524eb96c01d14dc7559f22f0a10de60a35017b0fa500f5bce0a360209cc7226f8a60c26c7f93a824fec8943d5adb4aaae082fda5dedbc0af622ff7e3aee48f8170e79b50ba0d86d48d581f8cc24cd784487fad63012694ff97709248b59dfb6a1a654dbae22c4e846f947ba2cda748a73ea785d086da8c635a3748d4474a74f767e6f47f847d97ebc1eca", 0xa6, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r2}, &(0x7f00000000c0)=""/83, 0x7d9bf2ea4bd465fd, 0x0) 05:26:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xb}}], [], 0x700}) 05:26:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r1 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r1, r2, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r0, @ANYBLOB=',group_i', @ANYRESDEC=r2, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r4 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r4, r5, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_i', @ANYRESDEC=r5, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) getgroups(0x2, &(0x7f0000000340)=[r2, r5]) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) r10 = socket$netlink(0x10, 0x3, 0x9) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r10, r11, 0x0, 0xdd) fstat(r11, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="b95d7f92d7bdac41646c12bd4819e3f253c35be7b628ce39195ab3ff94a1c79743fbece05369392562397b0eb647b44edddaa8c4c1eb5b937148f13e115c0b", 0x3f, 0x9a}, {&(0x7f0000000140)="3e051d6694fe9bd1e5d5d33ae91356a18a663fb79ad62cec0af72143ab346549987c9d983b6eb98e0e1800a75499ba29e124306f1606372d5a119532997a3a721c68258017d0d57f3d38a2c8ad17efa3edf4c55af5f686b5baa83387404849d9ed73b5b9bde7126eb94c6ac1f3d46f713b7ab4af3ffdbbfbf6d28bacf82cb45b5832754015bc948482f1584a1a9b3a66021aafd542473e0dfe6f8bd711e6310c9c01cc6d685d2ea79e0c861c1278b0ade5684ad85e4a90f2e08a25bb5cf6c2c241bf681f1a1f61d1c717f7cc8803e705d9e0f9625fba5bb81c5cd0e4e792b6c81743126314aea8ffc6f6f02cd77195904a", 0xf1, 0x1000}, {&(0x7f0000000240)="d6e7e7ed2fb571490b67182846ad304935be91ebb69e6feca49f48cf1be354441dcd4d253c9661e9628aa328cb9fb20b10803e52a9159f5a9ab60e65251dc1b4d29f680f1b826d6152c4c6fced9f3bebe3eefa100baec41efcfad5976c3e28a6d070fa1ab19bd70ec2", 0x69, 0xfffffffffffffffc}], 0x80000, &(0x7f0000000580)={[{@auto_da_alloc='auto_da_alloc'}, {@resgid={'resgid', 0x3d, r6}}], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@dont_measure='dont_measure'}, {@euid_gt={'euid>', r9}}, {@pcr={'pcr', 0x3d, 0x11}}, {@euid_gt={'euid>', r12}}, {@dont_measure='dont_measure'}, {@pcr={'pcr', 0x3d, 0x20}}]}) 05:26:18 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) keyctl$setperm(0x5, r0, 0x4002000) [ 527.067235][ T3025] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000000b, [ 527.237633][ T3132] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000000b, 05:26:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0000002e2f66696c6530202073656375726974797b2f2d626465765d6367726f75702029d829206367726f75705e6e6f6465766b657972696e676367726f757086766d6e657431405b250820759e7b82ac7365722f766d6e657431a2656d30402a0a74520f4e3bb487c99610f2a6ac87e42b104259719469e2169c97a9ec20bd"], 0x7c) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:18 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:18 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x3f00}, 0xfde1) 05:26:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x14c}}], [], 0x700}) 05:26:18 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x10000, 0x4080) connect$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x2000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="11dca50d5e0bcfe47bf070") keyctl$setperm(0x3, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f00000000c0)={0x7fffffff, 0xffffffffffffa7ea, 0x101, 0x0, 0x0, [], [], [], 0x9, 0x80}) 05:26:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa00}}], [], 0x700}) 05:26:21 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x80200}, 0xfde1) 05:26:21 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1002}}], [], 0x700}) 05:26:21 executing program 4: mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)=ANY=[@ANYBLOB="0300000000000000000000a405de4b4bbd08f1457c17e89d0ed1b2049a083aa17024007e4216f66d1f4dfab257e646508bd33506598eef582b284f38a9e848d106aef7a25adba545ee92122304d681b8586f57694dfcdcbddee5de00d9ccc6af03bb679e3626dcdaf2676299304c390fc0e29e67ff4a7e830e462c97062642ea55c933ccbcb10000000000"]) sendfile(r0, r1, 0x0, 0xdd) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f00000000c0)=0x1, 0x4) unlinkat(r1, &(0x7f0000000080)='./file0\x00', 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x39) r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) move_mount(r2, &(0x7f0000000100)='./file0\x00', r4, &(0x7f0000000140)='./file0\x00', 0x11) 05:26:21 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) getegid() r5 = geteuid() getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r7 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r7, r8, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r6, @ANYBLOB=',group_i', @ANYRESDEC=r8, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) getgroups(0x400001f3, &(0x7f0000000000)=[0xee01, r8]) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r11 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r11, r12, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r10, @ANYBLOB=',group_i', @ANYRESDEC=r12, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r14 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r14, r15, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=000000040000,user_id=', @ANYRESDEC=r13, @ANYBLOB=',group_i', @ANYRESDEC=r15, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) getgroups(0x3, &(0x7f0000000280)=[r12, 0x0, r15]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r18, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r20 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r20, r21, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r19, @ANYBLOB=',group_i', @ANYRESDEC=r21, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000480)={0x2a0, 0x0, 0x8, [{{0x2, 0x1, 0x1e, 0xffffffffffffffc0, 0x2, 0x7fff, {0x1, 0x6, 0x1ff, 0x3, 0x4, 0x9, 0x5, 0x1, 0x8, 0x7, 0x0, r4, r21, 0x4, 0x7}}, {0x2, 0x54eba51e, 0x18, 0xfffffffffffffffe, 'trustedwlan1^em0trusted]'}}, {{0x1, 0x0, 0x5, 0x7e, 0x10, 0x80000000, {0x1, 0x3ff, 0x2, 0x49, 0x2, 0xf9, 0xa7, 0x48154f4f, 0x6, 0x101, 0x2, r5, r9, 0x2, 0x1}}, {0x3, 0x6, 0x5, 0x5, 'wlan1'}}, {{0x6, 0x2, 0x4, 0x3, 0xfffffffeffffffff, 0x8, {0x4, 0x0, 0x0, 0x9, 0x2, 0x6, 0xf99, 0x8000, 0x401, 0x7, 0x100, 0xee01, r16, 0x6, 0x7ff}}, {0x3, 0x6c, 0x3, 0x1, 'syz'}}, {{0x1, 0x2, 0x5, 0x1, 0xffffffffffffffff, 0x12000000000000, {0x2, 0x9, 0x15, 0x1, 0x7fffffff, 0x81, 0x9, 0x4, 0x5, 0x6, 0xb5b, r18, r21, 0x3, 0x80000000}}, {0x1, 0xfffffffffffffff8, 0x3, 0x8001, 'syz'}}]}, 0x2a0) r22 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r22, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 529.857562][ T3462] EXT4-fs: 8 callbacks suppressed [ 529.857575][ T3462] EXT4-fs (sda1): required extra inode space not available [ 529.924369][ T3462] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001002, 05:26:21 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cbb, 0x8, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x0, 0x10000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$invalidate(0x15, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0xe8c08, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 530.023581][ T3575] EXT4-fs (sda1): required extra inode space not available [ 530.132306][ T3575] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001002, 05:26:21 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x4001}, 0xfde1) 05:26:21 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0, 0x2}, 0x1000, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000340)='\x00', 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000380)='big_key\x00', &(0x7f0000000400)='trusted,user)\x00') r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1003}}], [], 0x700}) 05:26:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f00000000c0)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffa5, 0x0, 0xa8a43a, 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') 05:26:21 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000000)={0x634, 0xfffffffffffffffa, 0x3, 0x10d}) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1c0000000, 0x0, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 530.793565][ T3700] EXT4-fs (sda1): required extra inode space not available [ 530.853786][ T3700] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001003, [ 530.977792][ T3718] EXT4-fs (sda1): required extra inode space not available [ 531.010637][ T3718] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001003, 05:26:24 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x900100}, 0xfde1) 05:26:24 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r1 = getpid() r2 = eventfd(0x101) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x244, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}, 0x8980, 0xfffffffffaee9a9e}, r1, 0xffffffffffffffff, r2, 0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x10000, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000340)=0x1, &(0x7f0000000380)=0x1) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000080}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x4, 0x70bd2b, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x2800) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000400)={0xaa, 0x32}) 05:26:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') r3 = socket$netlink(0x10, 0x3, 0x9) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r3, r4, 0x0, 0xdd) r5 = socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000140)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000000c0)=0xe8) sendmsg$xdp(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000300)={0x2c, 0x4, r6, 0x14}, 0x10, &(0x7f0000000680)=[{&(0x7f0000000340)="f37592b82765c44a702bc5170f6b382db93b64a2a00e487ebcf6ec3587a30d3d3f8cadfbfdea4dbf8c41c59c1b41d0745b04fb1f7a88ffc8b7cca910fdd2fd9961bf3c4b68bda85238ee8be9bb511dedd84a6b1dcf4d1d01608ef3221414d5cd4c94417863efaba09e18347858ce919a97c761c4e2c46cf140a9872d72f46fe1e3e7f8cdf3667ac3e0017a79a5331170cdeb62406872ccd4a4710458cae93c042d0c242d86ed6e4361c05fc3c445c40cd6020e6c66ebb566654797d42ee19645fdca6b3c254f988d3f36f279e0f17ae09624d5fda31931cef0b33526db87a8935ce70522ff", 0xe5}, {&(0x7f0000000440)="d34685bcc28ad1530bbdc97f93e81debf4f365dbd5eb92de9db0755c6a01d5fb89dbe28a376fdb51aba243e9439432e1a103ae5b3ef61eea13c1133157588b4f8d8beec6df0af197455694376fe27dd97d1c7559cb3fe9109b0a10cb4c65bb6e7fcb730e343bc59ddac231593f1c8c160499f4f23a604c950635292d9bda0a7c5e2cf788f1cb78c96efc4789d9eedd812f0e5f74642930bf396f3554cfd1ee9915ffbd272aa53a447fcbc162d3", 0xad}, {&(0x7f0000000500)="cfa23a7f70c44b20902bfd2b0850368e18a2f80d3118ac3cdf72da19bd2783534a39b30d28386d02c49bd9822fab4816d36292785143b2b6b7a6cfc355cae7a839e542360355b4d14185a40e1998fcb8a77f00b9754ebf572dfd411dc299d918bb409174a3960d77664b4d28911439f1a08cbfa448fef905f866fa31d9b15fc52e29a1f6c64cfe452a36c3c006e275fbab564154ff2bfd061802afe9184bc95ffcbf96eb9f0c6d9ca8d17bdaabde2796f5197e75fe5c6a7eea2f5107b0a52f0e05f2b71260a220b9", 0xc8}, {&(0x7f0000000600)="58be0366fc42c9b0045e738e06d06ad8ca3ce459c7724a627e2bfe09b7561bf8447326ad6ac3f4aa7bb6359e8bc3348fb0dccf9aa666be10bbfa273e9b04bb17291f7ce0abb75b8bf6d08eb1246afc49cc792652971d0cc40d2206e6f8d121ea3d0968c7216c7eb10bdbb9d204ca255fbb469b9d88bf5b90056c", 0x7a}], 0x4}, 0x40) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10100008}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=@gettfilter={0x6c, 0x2e, 0x345, 0x70bd26, 0x25dfdbfb, {0x0, r6, {0x7fff, 0xfff1}, {0xc}, {0x7, 0xa}}, [{0x8, 0xb, 0x83a3}, {0x8, 0xb, 0x1ff}, {0x8, 0xb, 0xe000}, {0x8, 0xb, 0xffffffffffffff00}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0x3}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0x6}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8900404}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)={0x1bc, r2, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x694f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_DAEMON={0x74, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1f}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffffd}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x3, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x24c1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x20080084}, 0x800) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:24 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) socket$nl_generic(0x10, 0x3, 0x10) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1004}}], [], 0x700}) [ 532.964839][ T3731] EXT4-fs (sda1): required extra inode space not available [ 532.991965][ T3731] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001004, 05:26:24 executing program 3: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1005}}], [], 0x700}) 05:26:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) fstat(r7, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000080)='./file0\x00', r1, r8) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:25 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8831, 0x0, 0x0, 0xb26, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:25 executing program 3: r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) r1 = syz_open_dev$media(&(0x7f00000004c0)='/dev/media#\x00', 0x101, 0x10000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) keyctl$update(0x2, r0, 0x0, 0x0) r2 = request_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000480)='user\x00', r0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r2) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r3, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x10a, 0x0) 05:26:25 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0xa000}, 0xfde1) 05:26:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1006}}], [], 0x700}) [ 533.833206][ T3876] encrypted_key: insufficient parameters specified [ 534.011216][ T3876] encrypted_key: insufficient parameters specified 05:26:27 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0xfe0700}, 0xfde1) 05:26:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1007}}], [], 0x700}) 05:26:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x2c6800) ioctl$KVM_SMI(r0, 0xaeb7) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2000, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100)=0x200, &(0x7f0000000140)=0x4) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, &(0x7f0000000080), 0x8, 0x2) 05:26:27 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x20, 0x1e, 0x201, 0x0, 0x0, {}, [@typed={0x8, 0x0, @fd}, @nested={0x4, 0x9}]}, 0x20}}, 0x0) 05:26:27 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 536.049874][ T4002] EXT4-fs: 10 callbacks suppressed [ 536.049885][ T4002] EXT4-fs (sda1): required extra inode space not available [ 536.063544][ T4010] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 536.089798][ T4002] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001007, 05:26:27 executing program 3: clock_nanosleep(0x2, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x8000c0000000015) [ 536.122140][ T4005] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 536.140402][ T4010] netlink: 'syz-executor.3': attribute type 9 has an invalid length. [ 536.150495][ T4005] netlink: 'syz-executor.3': attribute type 9 has an invalid length. 05:26:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x4, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0xffffff9b, 0x0, 0x1a8a03b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) write$binfmt_elf64(r0, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x10000, 0x6, 0x3, 0x10000, 0x2, 0x3, 0xe511, 0x1cf, 0x40, 0xc709, 0x1, 0x5, 0x38, 0x1, 0x15180000, 0x3a, 0x7}, [{0x6474e552, 0x100000001, 0x3, 0xef53, 0x1, 0x7, 0x800, 0x1}, {0x4, 0x80, 0x8, 0x20, 0x6, 0x80000000, 0x0, 0x5}], "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", [[], []]}, 0x12b0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0x202000) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000000c0)={r4}) 05:26:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1008}}], [], 0x700}) 05:26:27 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f00000005c0)='net/udplite\x00') sendfile(r1, r3, 0x0, 0xdd) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r3) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x100, 0x0, 0x0, 0x0, 0x50d, 0x8102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) write$vnet(r5, &(0x7f0000000340)={0x1, {&(0x7f0000000480)=""/194, 0xc2, &(0x7f0000000280)=""/15, 0x2, 0x2}}, 0x68) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 536.398669][ T4123] EXT4-fs (sda1): required extra inode space not available [ 536.411301][ T4123] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001008, 05:26:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0xdd) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8000, 0x80000001) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffe27, 0x0, 0x1a8b03b, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'L+', 0x7}, 0x28, 0x0) [ 536.479577][ T4131] EXT4-fs (sda1): required extra inode space not available [ 536.494117][ T4131] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001008, 05:26:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1009}}], [], 0x700}) 05:26:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) uselib(&(0x7f0000000080)='./file0\x00') mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 536.906413][ T4147] EXT4-fs (sda1): required extra inode space not available [ 536.916636][ T4147] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001009, [ 537.030917][ T4163] EXT4-fs (sda1): required extra inode space not available [ 537.044198][ T4163] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001009, 05:26:30 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x1000000}, 0xfde1) 05:26:30 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x186a0}, 0xfde1) 05:26:30 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x9f4, 0xffffffffffffffff, 0x0, 0x0, 0xa, [{}, {}, {0x0, 0x1}, {}, {}, {0x0, 0xc4c81a0}, {}, {0x6}]}}}) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r0, 0xbd48927267e15a72, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0xffffffffffffff5b}, 0x1, 0x0, 0x0, 0x4040}, 0x800) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) keyctl$update(0x2, r3, 0x0, 0x0) keyctl$update(0x2, r3, &(0x7f00000004c0)="ef144f496bd4d7ea5cb487870def9f327ace01ba5e0247a521d357697bde5a007aa3a503a9e1d2b9eea05f31e753f88a09f3ec40f64882bb3b5ee35e2eb3911478219b9310eed49ef3100612eeb3598a66f59df1ad8e6d520db77839388dee45b6f21be293adabba1e41e49d3bf4", 0x6e) sendfile(r1, r2, 0x0, 0xdd) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000480)) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r4, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000540)='vboxnet1])wlan1usermime_typeposix_acl_accesscpusetselinux\x00') keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r5, r4}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x100000000) 05:26:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x100a}}], [], 0x700}) 05:26:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x9c14, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), 0xc) [ 539.092719][ T4270] encrypted_key: insufficient parameters specified 05:26:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1010}}], [], 0x700}) 05:26:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) ioctl$SIOCRSGCAUSE(0xffffffffffffffff, 0x89e0, &(0x7f00000002c0)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000001480)={&(0x7f0000000040), 0xc, &(0x7f0000001440)={&(0x7f00000013c0)={0x68, r3, 0x8, 0x70bd29, 0x25dfdbfc}, 0x51}, 0x1, 0x0, 0x0, 0x2000}, 0x3e941697323ff376) mkdir(&(0x7f0000000000)='./file0\x00', 0xb5b70f45c07fe6cf) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mqueue_spool_t:s0\x00', 0x24, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x2, 0x0) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f00000016c0)={0xc, {0x40, 0x1, 0x1, 0xfffffffffffff001}}) r4 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000180)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000003c0)="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", 0x1000, r4) quotactl(0x80000000, &(0x7f0000001400)='./file0\x00', 0xffffffffffffffff, &(0x7f00000015c0)="bc5042a24336d4d3a3be9035eea8558343ad1c3c3db49d5b44d766482c2ac602a40da431853ba1fcb29b62c7f3aca1aaa35b0ec1cdfcc31397ee2d2aea884395623fa5e24f22ce0beaaff9749eff5c470ee3f9a380501762eeaae38d38119ad8fa604ac0ed06268f8bb6cfc437607d9cf65d037dd8cc6e5b240c8c7efa2fd7fb2ccb37e01f2acf882b64363cbe6df282f39cd6f9e5d6815795e2111fda0de7c8fed2589efb656250dce74396d56548783f65c7c4478794f5910c79cf9e54a593ca2f4b83944094e63773eb3c6ee431a463380cee237842b31b04251481c7ccd69c626a957a") ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f00000014c0)=""/253) [ 539.402401][ T4279] encrypted_key: insufficient parameters specified 05:26:30 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) syz_open_pts(0xffffffffffffffff, 0x113100) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1048}}], [], 0x700}) 05:26:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x800, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='\x00', 0x8000000000000000, 0x0, 0x0, 0x428c03e, 0x0) 05:26:31 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x204000, 0x10) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000280)) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:33 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x2000000}, 0xfde1) 05:26:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x104c}}], [], 0x700}) 05:26:33 executing program 4: getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:33 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x2, 0x0, [{}, {}, {}, {}, {}, {0x4000000}]}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x5) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000000)) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) ioctl$KVM_GET_CLOCK(r5, 0x8030ae7c, &(0x7f0000000280)) ptrace$cont(0x7, r1, 0x0, 0x0) sched_getscheduler(r1) eventfd2(0x3f, 0x800) semget$private(0x0, 0x2, 0x60) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r6, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:33 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x19000}, 0xfde1) 05:26:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = memfd_create(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000080)) 05:26:33 executing program 3: pipe2(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/udplite6\x00') preadv(r0, &(0x7f00000017c0), 0x33d, 0x6c00) 05:26:33 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f0000000480)) sendfile(r1, r2, 0x0, 0xdd) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000000)={0x4, [0x0, 0x8, 0x3, 0x0]}, &(0x7f0000000280)=0xc) r3 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r4, r5, 0x0, 0xdd) getsockopt$IP_VS_SO_GET_DESTS(r5, 0x0, 0x484, &(0x7f0000000cc0)=""/249, &(0x7f0000000380)=0xf9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r3, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 542.287785][ T4644] EXT4-fs: 12 callbacks suppressed [ 542.287796][ T4644] EXT4-fs (sda1): required extra inode space not available [ 542.371364][ T4644] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000104c, [ 542.443340][ T4752] EXT4-fs (sda1): required extra inode space not available 05:26:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x2021001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 542.499928][ T4752] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000104c, 05:26:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1068}}], [], 0x700}) 05:26:34 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) write$UHID_CREATE(r0, 0x0, 0x0) 05:26:34 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) [ 542.905051][ T4829] EXT4-fs (sda1): required extra inode space not available [ 542.979744][ T4829] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001068, [ 543.091278][ T4884] EXT4-fs (sda1): required extra inode space not available [ 543.105316][ T4884] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000001068, 05:26:36 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x4000000}, 0xfde1) 05:26:36 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x186a0}, 0xfde1) 05:26:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0xac0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x1) 05:26:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x106c}}], [], 0x700}) 05:26:36 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0xdd) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000340)={0x6, 0xf, 0x1, 0x1ff, "66da5960159598cf4d4e41ac5d79d898a856e947996cb24ca20508df5a5a4e12"}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101001, 0x0) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000280)=0x10001) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r4, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:36 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x20000}, 0xfde1) [ 545.298578][ T4902] EXT4-fs (sda1): required extra inode space not available [ 545.360679][ T4902] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000106c, 05:26:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1074}}], [], 0x700}) 05:26:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x840000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:37 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800010}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)={0x2c, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0xc1}, 0x44) sendfile(r4, r5, 0x0, 0xdd) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) getpeername$ax25(r7, &(0x7f0000000600)={{0x3, @rose}, [@default, @netrom, @netrom, @bcast, @default, @remote, @default, @netrom]}, &(0x7f0000000680)=0x48) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000480)={{0x1, 0x0, @reserved="75cda1d68b36d6d253d81aa1024c833a1431c06d826f402884a87c28ffd7a8bc"}, 0xa3, [], "359ffc366db723f8e4f104962fbd777393c548901bfa7f13ab233faf5f02460cab471066cb3d4fa8c3a820f8cf76999035505a9ce5917ad27b9b2cb06f798bcfd02549fae27ba5942eb807c63b319e62356afdbee9656f0f5d56025045ae6eb97e68ef88e37d2237f90df178409aa52f452f33b91ae05843c6e1ca7029c6a59ac03c1dc99040a48ddd6d8aafefdddc10afa51d1a95ac85c41ac8d8b12af9d5516d56a4"}) sendfile(r2, r3, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000280)=0x4) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x81000) sync_file_range(r0, 0xffffffff, 0x0, 0x2) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x4, 0x1, 0x9, 0x9c02, 0x40, "331471b2c50e12df43fa227ad6449a7361744c", 0x3, 0x4}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x107a}}], [], 0x700}) 05:26:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2f00}}], [], 0x700}) 05:26:39 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x5000000}, 0xfde1) 05:26:39 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) r4 = dup2(0xffffffffffffffff, r3) r5 = socket$netlink(0x10, 0x3, 0x9) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f0000000280)) fstat(r6, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r9, 0x0) r10 = socket$netlink(0x10, 0x3, 0x9) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r10, r11, 0x0, 0xdd) fstat(r10, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) r14 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000000)={0xa0, 0x19, 0x1, {0x2000, {0x42, 0x2, 0x6}, 0x0, r14, r15, 0x7, 0x8000, 0x9, 0x1f, 0x4, 0x9, 0x0, 0xfffffffffffffff9, 0x99, 0x5, 0x0, 0x0, 0xff, 0x9, 0x7}}, 0xa0) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x10000, &(0x7f0000001600)=ANY=[@ANYBLOB="66643d7a3b4895eb6206450122fc791e7c4db1916d2d0f86b16b37ed242c37a7eebf59f02139061570180d75f5080200e0abe1be6bcce77e0491c2fa42b1a57651b8cd6917f300"/85, @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r13, @ANYBLOB=',group_i', @ANYRESDEC=r15, @ANYBLOB=',blksize=0x0000000000001000,allow_other,max_read=0x0000000000000004,max_read=0x0000000000000001,allow_other,blksize=0x0000000000001600,blksize=0x0000000000000800,max_read=0x0200000000000000,blksize=0x0000000000001400,blksize=0x0000000000000400,fown', @ANYBLOB=',obj_role=/dev/capi20\x00,dont_measure,\x00']) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f00000006c0)=@broute={'broute\x00', 0x20, 0x1, 0x1ae, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000500], 0x0, &(0x7f0000000000), &(0x7f0000000500)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{0x3, 0x10, 0xf8, 'veth1_to_bridge\x00', 'lapb0\x00', '\x00', 'lapb0\x00', @empty, [0xff, 0x0, 0xff], @remote, [0xff, 0xff, 0x0, 0xff], 0xee, 0xee, 0x11e, [@quota={'quota\x00', 0x18, {{0x1, 0x0, 0x5}}}, @owner={'owner\x00', 0x18, {{r7, r9, r12, r15}}}], [], @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffc}}}}]}]}, 0x226) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x82043, 0x0) r0 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x101, 0x3, 0x6, 0x8, 0x3, r0}) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:39 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x20800}, 0xfde1) 05:26:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3b00}}], [], 0x700}) 05:26:39 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x186a0}, 0xfde1) [ 548.523599][ T5271] EXT4-fs: 10 callbacks suppressed [ 548.523616][ T5271] EXT4-fs (sda1): required extra inode space not available [ 548.632418][ T5271] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000003b00, 05:26:39 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x200, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x880a2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 548.763268][ T5383] EXT4-fs (sda1): required extra inode space not available [ 548.801837][ T5383] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000003b00, 05:26:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4000}}], [], 0x700}) 05:26:40 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x2, {0x0, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x0, 0x1}], 0x7}}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x60000, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000280)=r3) r4 = syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0x7f, 0x100) r5 = socket$netlink(0x10, 0x3, 0x9) ioctl$SIOCX25GCALLUSERDATA(r3, 0x89e4, &(0x7f0000000800)={0x2a, "300e18ff8c2455be819c802b368d2e6cfbd861c19182cd399db1dee9e131170e9ad05ee87907da5334403b4a876c9b87d95607bb4031a418527ee22c87e2bd3652bb3a67b78c268a42216fa8a650f2a7267998ba95094ca703780aa229984bbfdc3808c2f057c1e48d3c3dbce54beaba1c677090ccc4e29e2b073b0d069584f8"}) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r5, r6, 0x0, 0xdd) ioctl$KVM_CHECK_EXTENSION(r6, 0xae03, 0x80) r7 = socket$netlink(0x10, 0x3, 0x9) r8 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r7, r8, 0x0, 0xdd) ioctl$sock_bt_hidp_HIDPCONNDEL(r8, 0x400448c9, &(0x7f00000007c0)={{0x8, 0x80000000, 0x200000, 0x0, 0xffffffff, 0x4}, 0x100000000}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000480)={0x0, @in6={{0xa, 0x4e20, 0x20, @remote, 0xb989}}, 0xfffffffffffffffc, 0x9, 0x0, 0x10001, 0x12}, &(0x7f0000000380)=0x98) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000540)={r9, @in6={{0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}}}, 0x84) r10 = socket$netlink(0x10, 0x3, 0x9) r11 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)=0x108) sendfile(r10, r11, 0x0, 0xdd) ioctl$VIDIOC_TRY_DECODER_CMD(r11, 0xc0485661, &(0x7f0000000600)={0x1, 0x2, @stop_pts=0x9}) r12 = socket$netlink(0x10, 0x3, 0x9) r13 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r12, r13, 0x0, 0xdd) ioctl$DRM_IOCTL_GET_CTX(r13, 0xc0086423, &(0x7f00000008c0)) 05:26:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) [ 549.237491][ T5497] EXT4-fs (sda1): required extra inode space not available [ 549.295972][ T5497] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000004000, 05:26:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5d00}}], [], 0x700}) [ 549.601403][ T5616] EXT4-fs (sda1): required extra inode space not available [ 549.635244][ T5616] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000005d00, [ 549.690907][ T5621] EXT4-fs (sda1): required extra inode space not available [ 549.700767][ T5621] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000005d00, 05:26:42 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x6000000}, 0xfde1) 05:26:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x9d) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0x7530}, {0x0, 0x2710}}, 0x100) 05:26:42 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') r4 = socket$netlink(0x10, 0x3, 0x9) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f00000005c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800010}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)={0x2c, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'ib', 0x3a, 'syz_tun\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0xc1}, 0x44) sendfile(r4, r5, 0x0, 0xdd) r6 = socket$netlink(0x10, 0x3, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r6, r7, 0x0, 0xdd) getpeername$ax25(r7, &(0x7f0000000600)={{0x3, @rose}, [@default, @netrom, @netrom, @bcast, @default, @remote, @default, @netrom]}, &(0x7f0000000680)=0x48) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f0000000480)={{0x1, 0x0, @reserved="75cda1d68b36d6d253d81aa1024c833a1431c06d826f402884a87c28ffd7a8bc"}, 0xa3, [], "359ffc366db723f8e4f104962fbd777393c548901bfa7f13ab233faf5f02460cab471066cb3d4fa8c3a820f8cf76999035505a9ce5917ad27b9b2cb06f798bcfd02549fae27ba5942eb807c63b319e62356afdbee9656f0f5d56025045ae6eb97e68ef88e37d2237f90df178409aa52f452f33b91ae05843c6e1ca7029c6a59ac03c1dc99040a48ddd6d8aafefdddc10afa51d1a95ac85c41ac8d8b12af9d5516d56a4"}) sendfile(r2, r3, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000280)=0x4) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xb401}}], [], 0x700}) 05:26:42 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x30000}, 0xfde1) 05:26:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x106c}}], [], 0x700}) 05:26:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xff00}}], [], 0x700}) 05:26:43 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0xa8700, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000180)={0x18035}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = fsopen(&(0x7f0000000140)='hostfs\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r2, r3, 0x0, 0xdd) dup3(r1, r2, 0x80000) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1008}}], [], 0x700}) [ 552.078540][ T5759] Unknown ioctl 1074295883 05:26:43 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) openat$sequencer(0xffffffffffffff9c, 0x0, 0x400000, 0x0) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b65329509626699071a860088261af3fd5f91a922ac7", 0xb2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8831, 0x0, 0x0, 0xb26, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7feeff0d4b40}}], [], 0x700}) 05:26:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) setsockopt$SO_TIMESTAMP(r1, 0x1, 0xd, &(0x7f0000000040)=0x8, 0x4) 05:26:45 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0xa0860100}, 0xfde1) 05:26:45 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x4001}, 0xfde1) 05:26:45 executing program 2: ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f0000000100)={0x0, 0x100000003, 0x0, {0x0, @pix_mp}}) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x9) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 05:26:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = fcntl$dupfd(r0, 0xda6dd0f0ae923eca, 0xffffffffffffffff) getsockname(r2, &(0x7f0000000080), &(0x7f0000000100)=0x80) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) 05:26:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}, 0x3b}], [], 0x700}) 05:26:45 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000300)={0xfffffffffffffe50, 0x7fe00}, 0xfde1) [ 554.776983][ T6000] EXT4-fs: 12 callbacks suppressed [ 554.776999][ T6000] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000001000;" or missing value 05:26:46 executing program 2: [ 554.996720][ T6015] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize=0x0000000000001000;" or missing value 05:26:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a022, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x1000}}], [], 0x8}) 05:26:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff}) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000340)) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x207, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="fe098d168415dc30cfff49dd5ebea02eb94a28a58434da3d7c473f609cef17b3f920406d39a082843d7ee396b1a5ec2e4ad3c3bc4ec6913ec4e867417f26f57806a3a15fef73bc2300d93bdcfac27bd5ccfdcbb62cb8c82f18255fb644c8d4bc953296b273d39065154c6b0bf674521c7a07a4e91717c143e6a812cc941cdb01b4fcf916ded7e84a3f691a5af2c1a025e6ee953fd1d9e5ee203518c021c857cd71647b42bfd9be7dee4823df9b18dddaef73769031518c86c285ba04b09495", 0xbf, 0x2}, {&(0x7f00000001c0)="c2f8fa5ca7027e385172918dd22cbf3d453fe57f23c0eabcd65d64014df8ae422cae9edf95870f02dc693677a468e4f0316697809bfc383cecc62b55a052559004ed873bb55989", 0x47}], 0x400, &(0x7f0000000280)={[{@errors_remount='errors=remount-ro'}, {@errors_remount='errors=remount-ro'}, {@nls={'nls', 0x3d, 'iso8859-5'}}, {@show_sys_files_no='show_sys_files=no'}, {@errors_continue='errors=continue'}, {@case_sensitive_no='case_sensitive=no'}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}]}) 05:26:46 executing program 2: 05:26:46 executing program 2: [ 555.413764][ T6128] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 555.488770][ T6224] EXT4-fs (sda1): Unrecognized mount option "" or missing value 05:26:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1a8a03b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_tables_targets\x00') sendfile(r0, r1, 0x0, 0xdd) r2 = openat(r1, &(0x7f0000000080)='./file0\x00', 0xb2800, 0x154) connect$pptp(r2, &(0x7f00000000c0)={0x18, 0x2, {0x0, @rand_addr=0x10001}}, 0x1e) [ 557.600266][ T21] device bridge_slave_1 left promiscuous mode [ 557.608451][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 557.650138][ T21] device bridge_slave_0 left promiscuous mode [ 557.657375][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 557.776652][T31387] ================================================================== [ 557.785308][T31387] BUG: KASAN: use-after-free in __ext4_expand_extra_isize+0x1ab/0x290 [ 557.795972][T31387] Write of size 4064 at addr ffff88805b2e47a0 by task syz-executor.3/31387 [ 557.804711][T31387] [ 557.808212][T31387] CPU: 0 PID: 31387 Comm: syz-executor.3 Not tainted 5.3.0-next-20190920 #0 [ 557.817595][T31387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.828688][T31387] Call Trace: [ 557.832108][T31387] dump_stack+0x172/0x1f0 [ 557.836452][T31387] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 557.842286][T31387] print_address_description.constprop.0.cold+0xd4/0x30b [ 557.849849][T31387] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 557.857368][T31387] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 557.864058][T31387] __kasan_report.cold+0x1b/0x41 [ 557.864093][T31387] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 557.864106][T31387] kasan_report+0x12/0x20 [ 557.864118][T31387] check_memory_region+0x134/0x1a0 [ 557.864130][T31387] memset+0x24/0x40 [ 557.864147][T31387] __ext4_expand_extra_isize+0x1ab/0x290 [ 557.886155][T31387] ext4_mark_inode_dirty+0x74e/0x9b0 [ 557.902817][T31387] ? ext4_expand_extra_isize+0x590/0x590 [ 557.908720][T31387] ? ___might_sleep+0x163/0x2c0 [ 557.914047][T31387] ? __might_sleep+0x95/0x190 [ 557.919179][T31387] ? ext4_journal_check_start+0x1ba/0x260 [ 557.926210][T31387] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 557.932880][T31387] ? __ext4_journal_start_sb+0x146/0x4d0 [ 557.939115][T31387] ext4_dirty_inode+0x8f/0xc0 [ 557.944255][T31387] ? ext4_setattr+0x1f90/0x1f90 [ 557.949326][T31387] __mark_inode_dirty+0x68e/0x1390 [ 557.954642][T31387] ? current_time+0xa8/0x110 [ 557.959417][T31387] generic_update_time+0x21c/0x370 [ 557.965429][T31387] ? file_modified+0xa0/0xa0 [ 557.970392][T31387] touch_atime+0x23c/0x2a0 [ 557.975021][T31387] ? atime_needs_update+0x5f0/0x5f0 [ 557.980242][T31387] ? mntget+0x41/0x50 [ 557.984239][T31387] trailing_symlink+0x2e3/0x990 [ 557.989551][T31387] path_mountpoint+0x865/0x1e60 [ 557.995848][T31387] ? __kasan_check_read+0x11/0x20 [ 558.001406][T31387] ? __lock_acquire+0x16f2/0x4a00 [ 558.006903][T31387] ? path_openat+0x46d0/0x46d0 [ 558.011856][T31387] ? find_held_lock+0x35/0x130 [ 558.016894][T31387] filename_mountpoint+0x18e/0x390 [ 558.022604][T31387] ? filename_parentat.isra.0+0x410/0x410 [ 558.028946][T31387] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 558.035487][T31387] ? __phys_addr_symbol+0x30/0x70 [ 558.040546][T31387] ? __check_object_size+0x3d/0x437 [ 558.045956][T31387] ? strncpy_from_user+0x2b4/0x400 [ 558.051708][T31387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.058566][T31387] ? getname_flags+0x277/0x5b0 [ 558.064575][T31387] user_path_mountpoint_at+0x3a/0x50 [ 558.070401][T31387] ksys_umount+0x164/0xf00 [ 558.074844][T31387] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 558.081053][T31387] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.087648][T31387] ? __detach_mounts+0x2a0/0x2a0 [ 558.093129][T31387] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 558.099068][T31387] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 558.105045][T31387] ? do_syscall_64+0x26/0x760 [ 558.109833][T31387] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.115916][T31387] ? do_syscall_64+0x26/0x760 [ 558.121125][T31387] ? lockdep_hardirqs_on+0x421/0x5e0 [ 558.126450][T31387] __x64_sys_umount+0x54/0x80 [ 558.132180][T31387] do_syscall_64+0xfa/0x760 [ 558.136850][T31387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.142751][T31387] RIP: 0033:0x45c437 [ 558.146656][T31387] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.168249][T31387] RSP: 002b:00007fffafd58bf8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 558.177204][T31387] RAX: ffffffffffffffda RBX: 0000000000000057 RCX: 000000000045c437 [ 558.185361][T31387] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007fffafd58ca0 [ 558.193625][T31387] RBP: 00000000000000db R08: 0000000000000000 R09: 000000000000000f [ 558.201611][T31387] R10: 000000000000000a R11: 0000000000000206 R12: 00007fffafd59d30 [ 558.209595][T31387] R13: 0000555555d7e940 R14: 0000000000000000 R15: 00007fffafd59d30 [ 558.217720][T31387] [ 558.220251][T31387] The buggy address belongs to the page: [ 558.226100][T31387] page:ffffea00016cb900 refcount:2 mapcount:0 mapping:ffff888219f2f520 index:0x42e [ 558.235558][T31387] def_blk_aops [ 558.235570][T31387] flags: 0x1fffc000000203a(referenced|dirty|lru|active|private) [ 558.247224][T31387] raw: 01fffc000000203a ffffea00022001c8 ffffea00014ae8c8 ffff888219f2f520 [ 558.256919][T31387] raw: 000000000000042e ffff8880aa056690 00000002ffffffff ffff888059b30000 [ 558.266292][T31387] page dumped because: kasan: bad access detected [ 558.272931][T31387] page->mem_cgroup:ffff888059b30000 [ 558.278592][T31387] [ 558.281420][T31387] Memory state around the buggy address: [ 558.287228][T31387] ffff88805b2e4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 558.295644][T31387] ffff88805b2e4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 558.303907][T31387] >ffff88805b2e5000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 558.312469][T31387] ^ [ 558.316559][T31387] ffff88805b2e5080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 558.324660][T31387] ffff88805b2e5100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 558.333195][T31387] ================================================================== [ 558.341688][T31387] Disabling lock debugging due to kernel taint [ 558.349887][T31387] Kernel panic - not syncing: panic_on_warn set ... [ 558.356705][T31387] CPU: 1 PID: 31387 Comm: syz-executor.3 Tainted: G B 5.3.0-next-20190920 #0 [ 558.367212][T31387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.378569][T31387] Call Trace: [ 558.382192][T31387] dump_stack+0x172/0x1f0 [ 558.386517][T31387] panic+0x2dc/0x755 [ 558.390571][T31387] ? add_taint.cold+0x16/0x16 [ 558.395255][T31387] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 558.401393][T31387] ? preempt_schedule+0x4b/0x60 [ 558.406463][T31387] ? ___preempt_schedule+0x16/0x20 [ 558.411807][T31387] ? trace_hardirqs_on+0x5e/0x240 [ 558.416974][T31387] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 558.423041][T31387] end_report+0x47/0x4f [ 558.427261][T31387] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 558.433968][T31387] __kasan_report.cold+0xe/0x41 [ 558.439326][T31387] ? __ext4_expand_extra_isize+0x1ab/0x290 [ 558.445122][T31387] kasan_report+0x12/0x20 [ 558.449522][T31387] check_memory_region+0x134/0x1a0 [ 558.454632][T31387] memset+0x24/0x40 [ 558.458978][T31387] __ext4_expand_extra_isize+0x1ab/0x290 [ 558.465037][T31387] ext4_mark_inode_dirty+0x74e/0x9b0 [ 558.470403][T31387] ? ext4_expand_extra_isize+0x590/0x590 [ 558.476117][T31387] ? ___might_sleep+0x163/0x2c0 [ 558.481064][T31387] ? __might_sleep+0x95/0x190 [ 558.488006][T31387] ? ext4_journal_check_start+0x1ba/0x260 [ 558.493940][T31387] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.500425][T31387] ? __ext4_journal_start_sb+0x146/0x4d0 [ 558.506055][T31387] ext4_dirty_inode+0x8f/0xc0 [ 558.510728][T31387] ? ext4_setattr+0x1f90/0x1f90 [ 558.515992][T31387] __mark_inode_dirty+0x68e/0x1390 [ 558.521273][T31387] ? current_time+0xa8/0x110 [ 558.525944][T31387] generic_update_time+0x21c/0x370 [ 558.531159][T31387] ? file_modified+0xa0/0xa0 [ 558.536609][T31387] touch_atime+0x23c/0x2a0 [ 558.541018][T31387] ? atime_needs_update+0x5f0/0x5f0 [ 558.546425][T31387] ? mntget+0x41/0x50 [ 558.551202][T31387] trailing_symlink+0x2e3/0x990 [ 558.556218][T31387] path_mountpoint+0x865/0x1e60 [ 558.561061][T31387] ? __kasan_check_read+0x11/0x20 [ 558.566357][T31387] ? __lock_acquire+0x16f2/0x4a00 [ 558.571376][T31387] ? path_openat+0x46d0/0x46d0 [ 558.576450][T31387] ? find_held_lock+0x35/0x130 [ 558.581602][T31387] filename_mountpoint+0x18e/0x390 [ 558.586998][T31387] ? filename_parentat.isra.0+0x410/0x410 [ 558.592899][T31387] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 558.599152][T31387] ? __phys_addr_symbol+0x30/0x70 [ 558.604354][T31387] ? __check_object_size+0x3d/0x437 [ 558.609719][T31387] ? strncpy_from_user+0x2b4/0x400 [ 558.615109][T31387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.622530][T31387] ? getname_flags+0x277/0x5b0 [ 558.627931][T31387] user_path_mountpoint_at+0x3a/0x50 [ 558.633586][T31387] ksys_umount+0x164/0xf00 [ 558.638094][T31387] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 558.644247][T31387] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.651507][T31387] ? __detach_mounts+0x2a0/0x2a0 [ 558.656943][T31387] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 558.662409][T31387] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 558.668155][T31387] ? do_syscall_64+0x26/0x760 [ 558.672972][T31387] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.679672][T31387] ? do_syscall_64+0x26/0x760 [ 558.685830][T31387] ? lockdep_hardirqs_on+0x421/0x5e0 [ 558.691119][T31387] __x64_sys_umount+0x54/0x80 [ 558.695839][T31387] do_syscall_64+0xfa/0x760 [ 558.700826][T31387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.706932][T31387] RIP: 0033:0x45c437 [ 558.711690][T31387] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.734258][T31387] RSP: 002b:00007fffafd58bf8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a6 [ 558.743109][T31387] RAX: ffffffffffffffda RBX: 0000000000000057 RCX: 000000000045c437 [ 558.753077][T31387] RDX: 0000000000403520 RSI: 0000000000000002 RDI: 00007fffafd58ca0 [ 558.761824][T31387] RBP: 00000000000000db R08: 0000000000000000 R09: 000000000000000f [ 558.770748][T31387] R10: 000000000000000a R11: 0000000000000206 R12: 00007fffafd59d30 [ 558.780389][T31387] R13: 0000555555d7e940 R14: 0000000000000000 R15: 00007fffafd59d30 [ 558.790586][T31387] Kernel Offset: disabled [ 558.794929][T31387] Rebooting in 86400 seconds..