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"/1058], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x5, 0xa8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x80, 0xb4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd08, 0x1, @perf_config_ext={0xfffffffffffffffa, 0x4}, 0x0, 0x10000000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x5800}, 0x0, 0x0, r2, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:55:54 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3b, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1589.197598][T28611] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:54 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x48}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:55:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:55:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) [ 1589.254052][T28612] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r4, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000300)={0x40}) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x1f, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) unlinkat(r6, &(0x7f0000000280)='./file0\x00', 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x11, 0x401, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x84, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r8}, 0x49) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:55:54 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1589.365110][T28623] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1589.415168][T28626] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:55 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:55:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:55:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4c}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:55:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 06:55:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:55:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000040)=0x44) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:55:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:55:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:55:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) [ 1590.168593][T28660] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x60}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1590.259939][T28662] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:55:55 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1590.380446][T28674] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1590.432865][T28675] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:56 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffffffffff, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:55:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, 0x0, 0x0) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 06:55:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x68}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:55:56 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:55:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:55:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:55:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x6c}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:55:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:55:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 06:55:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 06:55:56 executing program 0: syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x63335baf, 0x2, &(0x7f0000000380)=[{&(0x7f00000000c0)="694205fb85415568125cdaf99fbdf91d466fa762baa4e8799209cc994e9c1b278ff7712ddc3c4750f1721270cf4d7177888ac8e42262", 0x36, 0x1000, 0x8abf}, {&(0x7f0000000280)="218204dba9fa6919d677b85d213302cb7b012fcc36e308f23eae488065b144b45fd46314e8ae8183aa307f941a8115f658583e5b2ddc151155e2d8c6929909055f248189ea602b5631fbd0824ce55ff796a280c72efe665a8a1d42305108eae027b3a5389b6973a91f2df089ea1a8d306c950f83d0ae32212e008af5b4598572603afd8ea41149eb10e2d1570848e058fbab5442552741ab5a46287fc9ec49defe2ad7237b", 0xa5, 0x7}], 0xa0000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f00000003c0)={0x3, 0x100, 0x10000, 0x8000}) [ 1591.120359][T28702] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x74}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1591.253101][T28713] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1591.358872][T28725] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1591.392155][T28726] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:57 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:55:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:55:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 06:55:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 06:55:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x7a}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:55:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07a4dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x1d, r5}, 0x10, &(0x7f0000000300)={&(0x7f0000000380)={0x7, 0x10, 0x100, {r6, r7/1000+10000}, {0x77359400}, {0x0, 0x1, 0x1}, 0x1, @can={{0x0, 0x0, 0x1, 0x1}, 0x1, 0x1, 0x0, 0x0, "0c0217cad6a26a53"}}, 0x48}, 0x1, 0x0, 0x0, 0x44}, 0x28004840) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) [ 1592.126537][T28748] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1001, 0xfffffffffffffffe) 06:55:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) [ 1592.168685][T28750] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:55:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 06:55:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffe) [ 1592.278253][T28761] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1592.310553][T28765] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:57 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, 0x0, 0x0, 0x0) 06:55:58 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:55:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:55:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:55:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x200001ca, 0xfffffffffffffffe) 06:55:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa300c15b7788185d8e617e0400000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9ca1b7481b72e1c40d4db248c17ff8e1b315ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d7f8133e0f96763bb2e674de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533a92a7c2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa470000010000000000d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c2279360000000000000000000000000000000000000000000000000000000006a712cf737dc5bc30240e872762eb5e7c1a7e46fca35cc1a22116469b5f2d81e3f7146d30a93"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) 06:55:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, 0x0, 0x0, 0x0) 06:55:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x1c, r3, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}}, 0x4) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x800, 0x70bd2d, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4010) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r7, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x1f, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x11, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendto$packet(r1, &(0x7f0000000280)="b41bae1a4938d740ccc593673c48ab3c79ed1716f658fff5b34df2766ebf47cb1ea3c59f6283c0a136522ff2d40b36cc6c2da4755df36ca47664539cec46716fbd3003c47d919490908ece50f4157896d9d5c85ffb2cf35d3cc8253b180e6a9ecb0a27d14805ddc10ba12a39f617256f96e0458d45c13f64ce45d9b3221c0018b5eb57ce638b79effa590bc90b2b2d1a1a339c17e649b6bbb030cd5e4a0596b115998ca22f741b464a902b9a2fb4462551355588a590d35c5abce5c7404cd0e79cf4d4603c66b9174c116a33b68035a5fb78b9d6fa9e3b", 0xd7, 0x40000, &(0x7f0000000200)={0x11, 0x1a, r7, 0x1, 0x80, 0x6, @link_local}, 0x14) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f00000001c0)={0x8, 0x10, [0x8, 0x0, 0xfffffffd, 0x3]}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:55:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:55:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, 0x0, 0x0, 0x0) 06:55:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:55:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x10001, 0x880) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4805) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1593.205507][T28807] encrypted_key: insufficient parameters specified 06:55:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:55:59 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:55:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:55:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:55:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80), 0x0, 0x0) 06:55:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000000)=0x2, 0x4) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:55:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004, 0x0, 0x53, &(0x7f0000000000), &(0x7f0000000280)="6d5e59518ef247a3c475109750bb32b9ad51df09a14d542b1f5b317627501b83feabf5b5f6fd17e4a4d2d88bfae28243b5781052e2b80823ca830d9f5245ea44f8a16249f9b7cdaa9bee033d7a9fd2b8867397"}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$bt_rfcomm(r2, &(0x7f0000000040)={0x1f, @any, 0x6}, 0xa) 06:55:59 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:55:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000000)=0x3f) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1594.136120][T28849] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80), 0x0, 0x0) 06:55:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000000c0)={&(0x7f0000000040)="339f57a248ac57bc11f24dabadcf9b240219b3c4423056f9c7d7e92167a7e5b3ddba74d606b5d49da1a05c74c35577a46bf9ef46377aadd1428d4e9d", &(0x7f0000000380)=""/227, &(0x7f0000000280)="59f2ce871bf02ab94163d38316e38773c7f0470359c3533e3eca0f36da3873c0501080e4d31681ebfa13fbe0e6f1c0ef49c19c66cc1a8b52b5410951dbe9cfe445d9ec49800471ceca5988b46961a13c", &(0x7f0000000480)="1d0a9bd13f40e10c178b12ddf0381e74568730616ec76bf8d8842ae78b540ff6f39558fccce90389e95f2f2668039e710003a5d7677e46b03c2fc734d0309805c3fd0aeaf1dcb79b2ae78907c03d3b0dc5df84b4ae373baa0a7d89f3a303e2b87831f56e5986c4a9169f5829833f2b81aaac732032d93de788f73277f19b37295a35a7debb95789edca3ce50f5e0dfe6072d0b5fad2bf8604b9f32d51e74b436cd9c81f9d7afd9af23659ac468b66b64883e05cf49d7adf83dfafbfe", 0x1, r2, 0x4}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x110e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) prlimit64(r4, 0xf, &(0x7f0000000300)={0xe8c8, 0x4}, &(0x7f0000000540)) 06:55:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1594.245431][T28861] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:55:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_FPEXC(0xc, 0x40000) socket$caif_stream(0x25, 0x1, 0x4) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1594.294555][T28864] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1594.380250][T28874] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1594.394789][T28876] ptrace attach of "/root/syz-executor.0"[7030] was attempted by "/root/syz-executor.0"[28876] [ 1594.922328][T28885] ptrace attach of "/root/syz-executor.0"[7030] was attempted by "/root/syz-executor.0"[28885] 06:56:00 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80), 0x0, 0x0) 06:56:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f6164920f637279307466302d30303030303030303030303030303030363420000000000000000000000000002950673f00"], 0x1, 0x0) ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000080)={[0x5]}, 0x8) r2 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_CLEAR_HALT(r2, 0x80045515, &(0x7f00000000c0)={0x1, 0x1}) r3 = shmget$private(0x0, 0xf000, 0x0, &(0x7f0000000000/0xf000)=nil) shmat(r3, &(0x7f0000001000/0x1000)=nil, 0x6000) shmctl$SHM_LOCK(r3, 0xb) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000000)={0x89, @empty, 0x4e21, 0x1, 'dh\x00', 0x10, 0xfffffffb, 0xf}, 0x2c) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a95b359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d38057824db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba850400000077b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1048], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:00 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 06:56:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:56:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1595.445757][T28916] ptrace attach of "/root/syz-executor.3"[7310] was attempted by "/root/syz-executor.3"[28916] [ 1595.472146][T28918] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1595.507450][T28919] ptrace attach of "/root/syz-executor.3"[7310] was attempted by "/root/syz-executor.3"[28919] 06:56:01 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:56:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3c, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x84800, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6c65723a757330303635200000009c388dd0147e49826781fe041e000000000000000000000000007d7db045b79fb65909c32ef1945f28efd014960bf30a3cf49ceb6375ebc04f39e4ea2fe8292ddc39c493c9a8c2284fdf3d6dcaa325a1148e007e3c8125571936718aba8fb95d6e8e86b59deadc04e11f92f01b44dbb857f4b370af14dfdbfe4a4c25b2e43e2323000000000000"], 0x2f, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r6, 0x7706, &(0x7f0000000040)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) dup(r8) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:01 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r1, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r5) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={r3, r5, r6}, 0xc) [ 1596.147281][T28941] encrypted_key: insufficient parameters specified 06:56:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x2, 0x8}}, 0x20) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f616420656372797074667320757365723a757365723a2030303030303030303520001ea4fcb68081c9bd02d334c5366d8da84c6282290248d243394a03d221db948d73e63dde61878d5c4383662e22edc2f6b20e7d3c7fe46acfd5c4d055cae1fbd14c2a1ba8d95aea1f9cf307b93131575e012f48ceaba417c333b02836532d43ce2eaa4f71ba5400"/149], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r4, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x1c, r5, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}}, 0x4) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r5, 0x4, 0x70bd2b, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040090}, 0x4000000) 06:56:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:56:01 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1596.211126][T28947] ptrace attach of "/root/syz-executor.0"[7030] was attempted by "/root/syz-executor.0"[28947] 06:56:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f0000000040)={0xb, 0x0, 0x1, {0x100, 0x4, 0x200, 0x101}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:01 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1596.419745][T28962] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1596.463234][T28965] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1596.476014][T28940] ptrace attach of "/root/syz-executor.0"[7030] was attempted by "/root/syz-executor.0"[28940] 06:56:02 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)}}], 0x1, 0x0) 06:56:02 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x27, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:56:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x113, 0x0, &(0x7f0000000380)="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", 0x0, 0xfe, 0x60000004, 0x0, 0x30, &(0x7f0000000000), &(0x7f0000000040)="73c2d0c0bff6029c05e829338647221e9e83b22b2891216f1f4ed3c251a05644e564ffb47bfec4a6892bc6915cb6375b"}, 0x40) 06:56:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000280)=0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r5) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f00000002c0)={0x6, 0x7f, {}, {r5}, 0x6fb, 0xa0}) r6 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)={0x1c, r8, 0x205, 0x0, 0x3, {}, [@SEG6_ATTR_HMACKEYID={0x8}]}, 0x1c}, 0x1, 0x6c}, 0xa084) sendmsg$SEG6_CMD_GET_TUNSRC(r6, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, r8, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xf8}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}]}, 0x40}}, 0x4000800) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1597.099748][T28987] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f61642065637279707466040000000000006a8313f47c80673dd7888d93888664a6007365723a20b03030303030"], 0x2f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000000)={0x3ff, 0x7c5f, [0x0, 0x1, 0xe08d, 0x1000, 0x7], 0x6}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:02 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:56:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)}}], 0x1, 0x0) [ 1597.146556][T28990] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0xa0, 0x3, 0x1, 0x801, 0x0, 0x0, {0x0, 0x0, 0x9}, [@CTA_NAT_DST={0x34, 0xd, 0x0, 0x1, [@CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}]}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @private1={0xfc, 0x1, [], 0x1}}]}, @CTA_TUPLE_MASTER={0x58, 0xe, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @local}}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20008000}, 0x4890) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f616420656372795074667320757365723a75736572362030e54d65b5d7ebf6b637127e8d4ef1423030303030303030303030305d77a943c6511e276bd9c45995ab0b08363520000f4647ef3135a529a1515a3090745895d0cef337b06621e4eff8abf726152a7dd0d69940dc44235037175b789dbd7e71db000000000000000000"], 0x2f, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000280)={0x1ff, 0x7e2, 0x1, 'queue1\x00', 0x4}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r2, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'ipvlan0\x00', @ifru_hwaddr=@remote}}) [ 1597.268633][T29002] encrypted_key: master key parameter 'ecryptf' is invalid [ 1597.306098][T29007] encrypted_key: master key parameter 'ecryptf' is invalid 06:56:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)}}], 0x1, 0x0) [ 1597.417364][T29014] encrypted_key: insufficient parameters specified [ 1597.447661][T29016] encrypted_key: insufficient parameters specified 06:56:03 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2d00000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 06:56:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', 'ecryptfs'}, 0x1e, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x0, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 06:56:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:03 executing program 0: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept$packet(r1, 0x0, &(0x7f0000000040)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1598.138485][T29036] encrypted_key: keylen parameter is missing 06:56:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x0, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 06:56:03 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0x4e, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a2c31f51aee508a26f9e08c14dea7c9a6ee1a72d40ae470b5164c153d3e53d65664088db609bcce", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1598.183603][T29040] encrypted_key: keylen parameter is missing 06:56:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000080)={r3}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000001c0)={r3, 0x9, 0x10}, 0xc) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) r6 = openat$audio1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio1\x00', 0x1e3800, 0x0) ioctl$SNDCTL_DSP_POST(r6, 0x5008, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x82, &(0x7f0000000080)={r9}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000000)={0xfff, 0x4, 0x1f, 0xff, r9}, 0x10) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:03 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1598.346740][T29049] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x0, 0x1, "ec"}], 0x18}}], 0x1, 0x0) 06:56:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000280)="084a50975a6507be287193a21822772b2a4554ae7cde1b6cc0a90fccfec89a70c5031eaa88487e19594957d6f7a0c85b6cbf98889ce21066fbf68872a30c00f832bca91d72dbb2d2c0a2cb9141224ab2c42d7d6ed5b6791ea5e8c68bed8b97e4ee7e42ef4b19abf3535a8fbe4bb1a7d1cd0dad307dbfb4f23637f185fb39a4e711f22870b33010f1a2af97f8ecf661000e134b3cb0", 0x95, r4) keyctl$instantiate(0xc, r4, &(0x7f00000001c0)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'user:', 'syzQ:a\a\x82\x95\xc9v\x05#\"\x81\x0f\xea[O\x01Hs$\xd9\x98R\t\xd7\xea\xe4\x1d\x1f\xe8\xc4\x0eK3n\x05z\x86\x97\x17\x9f\xb6tU\xab\x9clp\x85\x80\x94)ev\xf6\x02\x88\"\xcd\xc9\v\xb6\xe5\xfb\x95\xca\xbd\xa7#O\x19\f62EU\x01\x99\xad!\f\x862\x82sg\x85{\a\x93>7\x9daJ\x7f\f\xed \xbap8\xc0\xa0\x93\x0fp\xc7\x17u!\b\x00\x00\x00\x00\x00\x00\x00@U\x93\xca\x0e*\x1c\xc4', 0x20, 0xe89}, 0xaa, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1598.431441][T29051] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1598.538121][T29061] encrypted_key: insufficient parameters specified 06:56:04 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3b00000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa, 0x4088012, r2, 0x7070b000) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="48d76c6f6164206563727970d8d9e53e294790f0ebc27974667320757365723a757365723a20303030303030303030"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x0, "ec"}], 0x18}}], 0x1, 0x0) 06:56:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x13) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x82, &(0x7f0000000080)={r5}, 0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000280)={r5, @in6={{0xa, 0x4e22, 0x7, @mcast1, 0x2}}}, 0x84) [ 1599.111249][T29079] encrypted_key: master key parameter 'ecrypØÙå>)GðëÂytfs' is invalid [ 1599.145443][T29084] encrypted_key: master key parameter 'ecrypØÙå>)GðëÂytfs' is invalid 06:56:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x0, "ec"}], 0x18}}], 0x1, 0x0) 06:56:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x14, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = request_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='encrypted\x00', 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000480)='keyring\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:'}) keyctl$instantiate(0xc, r2, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f00000001c0)={0x1000, 0x2}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendto$ax25(r8, &(0x7f0000000000)="a65d94eebcaf2aaf8fe4ec38aaf373b5de6c7b20c01e5958bf525e238530bb99d880fa5f887f03884b06a31de7a3bb19912ec53303ff865d10d92beff41f3fd9f9cc854fd032a41c5164d8b29b3b129503a403e5fb42ff5bbaf52aeb31067cc3c54db01379b5b36021a211bef0379712c08a4bf9a6e74c94abf154cc9c288d12d166e24733128a77d1d2edb323aa38acca6b6066414d5a4a60033439fb58d3232107a35fc863af3fdfb0d6ba69198506410bd06c4b07d7adc8e31cf66b75531f0bbedba4d73e7a7713ccb0e1714a63e221e44a7b12959f1493768701efada3ed14c857f07dc5", 0xe6, 0x10, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r1, 0xc038563c, &(0x7f0000000200)={0x1, 0x0, {0x0, 0x7f, 0x3f, 0xfffffffc}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x0, "ec"}], 0x18}}], 0x1, 0x0) [ 1599.454001][T29102] encrypted_key: insufficient parameters specified 06:56:05 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x10, 0x110, 0x1}], 0x10}}], 0x1, 0x0) 06:56:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f2e0c616420656372797074667320757365723a757365723a203030303030303030303030e830303030303019352000"], 0x2f, 0x0) readlinkat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/24, 0x18) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSTI(r3, 0x5412, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = accept4$phonet_pipe(r5, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80800) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'vlan0\x00'}) 06:56:05 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x80, 0x106) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$netrom_NETROM_T2(r7, 0x103, 0x2, &(0x7f0000000400)=0x2, 0x4) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x82, &(0x7f0000000080)={r8}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000280)={r8, 0xa3, "a62996c847326e355dd553bc4180ea26656305dc9eefc3e1eeefc96b4ed46570122d214287c7ede9ae7a9ddfe41ae03ca9026476b68037dd451390ee34e675694e0a7413374eb4f76487b5869b296276481c599f9ccecd7428aaf605de93a699261dfb741ae94609258dcaf8e32e2af6671f4b37ecc66dccf5e73ce717b2da13561a3a5c68e9ed8fc8efbb92171be1b05ea1ccc64d42808d6ccff81638ffc742a9f654"}, &(0x7f00000000c0)=0xab) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000380)=@assoc_id=r9, &(0x7f00000003c0)=0x4) 06:56:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1, 0x0, &(0x7f00000000c0)="b9", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1600.214005][T29131] encrypted_key: insufficient parameters specified 06:56:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x10, 0x110, 0x1}], 0x10}}], 0x1, 0x0) 06:56:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f6164206563727970746673207500000000000000003a2038323023303030000200000000000030303036352000"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1600.259153][T29136] encrypted_key: insufficient parameters specified [ 1600.390509][T29146] encrypted_key: master key parameter 'u' is invalid 06:56:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x10, 0x110, 0x1}], 0x10}}], 0x1, 0x0) 06:56:05 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1, 0x0, &(0x7f00000000c0)="b9", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1600.431141][T29148] encrypted_key: master key parameter 'u' is invalid 06:56:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x101, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x82, &(0x7f0000000080)={r7}, 0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000040)={r7, 0xff, 0x20}, &(0x7f00000000c0)=0xc) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000001600)=ANY=[@ANYRESHEX=r0, @ANYRES32=0x0, @ANYBLOB="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", @ANYBLOB="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", @ANYRES32, @ANYBLOB="7210489e72e1d7d647f852dac6d81ce1e8825d68f55cb6c7e2df6db0be0f4695ae485a58a8a4d4f44ee5133f9095124ea3e5d9ca284feaf6f387b3c0041dfd6cba73e37cc528a2d9050792a99cceb61f765e817c2e5bbade2a5ed27344c791483df5ef0c753d6301048062b1c1fda3b44ca3438ce66377f4fd06f5576cf993a9e7c0c80c5263659e266eb601cbd9b60f825d17950bb9688e3b629b8dd8412cdd236c68", @ANYRESOCT=0x0]]], 0x2, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1600.572903][T29158] encrypted_key: insufficient parameters specified 06:56:06 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:06 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x24801, 0x0) write$P9_ROPEN(r1, &(0x7f00000000c0)={0x18, 0x71, 0x1, {{0x0, 0x0, 0x5}, 0x5}}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000300)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) sendmmsg(r2, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r3, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, "ec"}], 0x18}}], 0x1, 0x0) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r4, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:56:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1, 0x0, &(0x7f00000000c0)="b9", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210207fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x4) setsockopt$X25_QBITINCL(r2, 0x106, 0x1, &(0x7f00000000c0)=0x1, 0x4) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="6f73322e6583727970746673"], &(0x7f00000001c0)=""/206, 0xce) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000002c0)="b97e167e2f744d001e0488e6ad5a3e850abd26480e3a24192fbfd08b4104168861eaeea640d3921698c4d7e20076520e168efeb0a3b274984bb1ca9fa48e4df362ca1c33c2a54cd0bda6ac7b515d465098735d5643fb0c4acd4a0c5c717d8bb7770acffe72ea768beb992604403dc3b937e95d7f267f3583841ee142ac330d83192db29a9179e5f06a4b899b8f9e68b06dddc003d1c669062a3fb1663d9effa2e271da5edece55b75363ef0b1378a10a634f831a7559b6f766b462a4595d1e52ffa22eac034cd09352d0eb79b1800813788ab1d43abb71997489131a3198615c10c15b4054fa5ab00f744fbd7e96", 0xee) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1601.207286][T29179] encrypted_key: insufficient parameters specified 06:56:06 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x27, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0e55bd48e802a8e0b8118a67fbe37593a014e8a", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1601.255326][T29183] encrypted_key: insufficient parameters specified 06:56:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1601.378097][T29190] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29190] [ 1601.433102][T29192] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1601.488098][T29199] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1601.541725][T29202] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1601.600560][T29206] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29206] [ 1601.613026][T29208] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:07 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_ENCODER_CMD(r5, 0xc028564d, &(0x7f0000000000)={0x0, 0x1, [0xfffffffd, 0x3, 0x98, 0xb7ba, 0xffffffff, 0x80000001, 0x1c, 0x7]}) 06:56:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:07 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='syzkaller\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) [ 1602.220450][T29223] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29223] [ 1602.236570][T29224] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000040)="3ee181a556ee006d3cfd6d8a69ea79a565c16ee9eb3c37410e80433197f30a1d2e16e3977fbc89a4ce08b0a10dcbc5ba626486a80294eb0a3aa26dbf151d2e513111e1bf5f7155c5bb5c30b7d8a46ceac21335f082ec2ba6e7a80314b4a34edd5045d735751fed77d4cd18a532931c", 0x6f, 0xfffffffffffffffe) [ 1602.303832][T29227] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1602.336622][T29229] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1602.392550][T29236] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29236] [ 1602.417425][T29240] encrypted_key: insufficient parameters specified 06:56:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000000)=0x5, 0x4) 06:56:07 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1602.447990][T29243] encrypted_key: insufficient parameters specified 06:56:07 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) [ 1602.580597][T29252] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1602.631618][T29256] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1602.648130][T29259] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29259] 06:56:08 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x5c00000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000040)) 06:56:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SIOCX25SDTEFACILITIES(r1, 0x89eb, &(0x7f0000000000)={0x5, 0x18a, 0x7, 0x5, 0x0, 0xf, 0x24, "b86d70d6001f56e8999afb214b910e2544b6dde2", "430eb9b0f6671b2390032d3b6dd4aa30d12bc85a"}) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@null=' \x00', 0x5, 'veth1_macvtap\x00'}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x2f, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r2, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = accept(r2, &(0x7f0000000040)=@in={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x80) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x400000, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) r6 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r6, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r6, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r7 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ppoll(&(0x7f0000000340)=[{r0, 0x11780}, {r3, 0x10}, {r4, 0x4}, {r1, 0x34}, {r5, 0x1108}, {r6, 0x2100}, {r7, 0x200}, {r1, 0x80}], 0x8, &(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)={[0xcc]}, 0x8) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x3, &(0x7f0000000e40)=ANY=[@ANYPTR64, @ANYRESDEC], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, 0x10}, 0x78) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000005c0)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, {&(0x7f0000000480)=""/210, 0xd2}, &(0x7f0000000580), 0xe}, 0xa0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004, 0x0, 0x22, &(0x7f0000000000), &(0x7f00000008c0)="7b4a5cfd8c649eac1232f0990fa438ae08e74439e5e131baea4cd10edb1379a2fa15"}, 0x40) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) syz_open_procfs(r4, &(0x7f0000000680)='net/unix\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) syz_mount_image$nfs(&(0x7f00000006c0)='nfs\x00', &(0x7f0000000700)='./file0\x00', 0x5, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000740)="75de99ca263ac6d5891d87252dc01c230587516f3087da94bfecbf389c2e53e5c2ea6699a0a1ca94673af6e165d55c873affe9338bc6fe5cffbca3bd166c59f10e53b4598269b94de6cf23633d4dd13baa158b61c6192200becff3d55edcd6b3c2f4652c12101a56b507595258b12aa42e12ae11d7d226d22d006fd8d5df24c8", 0x80, 0x9}], 0x880010, &(0x7f0000000800)='-vboxnet12\x00') ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000840)='NLBL_CIPSOv4\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r6, &(0x7f0000000280)="357a925d711fa6783d485829c6cef6424886e9290590c319cd4c92189942edfee00e5f32b3699cd6fe1db7459c2b74e4118842cd5eb2edcd16c7c697ef6c77619aeff3ee284836d66411bfd77c4d14c8af6c92e4cfd659967a95ec8f", &(0x7f0000000380)=""/193}, 0x20) accept4$rose(r6, &(0x7f0000000040)=@short={0xb, @remote, @bcast}, &(0x7f00000000c0)=0x1c, 0x1000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000880)='/dev/btrfs-control\x00', 0x200, 0x0) 06:56:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x5, 0x8, 0x4) 06:56:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x14, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405e8b528b0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1603.205189][T29275] ptrace attach of "/root/syz-executor.0"[7030] was attempted by "/root/syz-executor.0"[29275] [ 1603.207262][T29276] encrypted_key: insufficient parameters specified [ 1603.236020][T29278] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29278] 06:56:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 1603.339140][T29291] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1603.343661][T29283] ptrace attach of "/root/syz-executor.0"[7030] was attempted by "/root/syz-executor.0"[29283] 06:56:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f6164206563727970746673207531316a5270a18bc20e7365723a757365723a2030303030303005003030303030303030303036352000"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1603.401237][T29302] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29302] [ 1603.406306][T29295] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) 06:56:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) pause() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_STATUS64(r5, 0x80984120, &(0x7f0000000280)) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000100)=[{}, {}, {}, {}], 0x0, [{}, {}, {}]}, 0xa8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x800400205) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f616420656372797074667320757365723a594465723a203030303030303030303030303030343030300835200009be1e92fa2dd857d88b5b14fc8973a64f4c729274b2c143fb7483da169a83c5d7054d30b04ab35366f67f1ff5dcab38a7d5d6f0fcc8429285feaa4974afc4e7239369ec58a7ed46226b5d56982cf43de5305b541577a9214897013534c5967c3acdc783f282fed495ff0176cd5d0eb72c8864199858251c661bc44e7826ea7583834f6cafcfb5a06adb42ebdfee3dbd152583bd29f65fd1e20bc34b5cb297c4f1"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1603.544778][T29309] encrypted_key: insufficient parameters specified [ 1603.608505][T29314] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29314] [ 1603.699733][T29319] encrypted_key: insufficient parameters specified 06:56:09 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) 06:56:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002700)={0x44, r4, 0x1, 0x0, 0x0, {0xb}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb}}, {0x8}}]}, 0x44}}, 0x0) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x90, r4, 0x148eb6ad04dd9176, 0x70bd2b, 0x25dfdbfe, {}, [@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x90}, 0x1, 0x0, 0x0, 0xb1e71e2ea5382a5}, 0x4000040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x105800, 0x48) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f00000001c0)={0x1, 0x0, [{0x2000, 0xa4, &(0x7f0000000040)=""/164}]}) epoll_create(0x1602) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f616420656372797074661231757365723a757365723a2030303030010100003030303030303030303036352000"], 0x2f, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) add_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000004c0)="70d3000015b5fa0737c2113fad6b63e188e087a9fea3e4a7d13a86ac1ca96383102f9bf4ec3018b27a6001a745bc8c8e8cb7b5fd95927b132db08e2e3cc2869f6849e5805952137f06ff4147816741712bbf9ffe1a546198210224702c0b8460cdb2b4490be1ed13bd413c2a3d1b011685797d85402a3f8bca2a0ac47243a9464959009a20e84b14df4636d6be8d8af49eb2b4f989585b5500b0a8ecd3acc6de12b18035774bf2df2997d0bc74dd4993f1f2816200a9cf84f12851feaa129fe773b442084beb3d4ab793ef6fddaa514f98b0819f886742f75b88c173c568786dd65bb4c62d6ade95cccf773d4b1f01628add81e29d22edfea7fa266e78", 0xfd, r3) 06:56:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1, 0x0, &(0x7f00000000c0)="b9", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) 06:56:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'default', 0x20, 0x8, 0x20, [0x62, 0x66, 0x30, 0x66, 0x33, 0x66, 0x35, 0x30]}, 0x39, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1604.267310][T29340] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 06:56:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) 06:56:09 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="6c6f617620656372797074667320757365723a757365723a2030303730303030303030303030303030303036352000c34f3ad9b8bf9e5286ce31644dfd00f9a440e0d11f04f3a3216aff37bbb20f7e227257935af884947b0a9a310cd33491ffe6e38cc892bb9c3d849521e81c8af0c00000977dff9162b0ceeb4d71c588a49b0244b09240ac486fc1c5a2fe64534d0a89ebbc0666a8ff0d"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGSND(r3, 0x8040451a, &(0x7f0000000000)=""/202) 06:56:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1, 0x0, &(0x7f00000000c0)="b9", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1604.414785][T29354] encrypted_key: insufficient parameters specified [ 1604.450454][T29357] encrypted_key: insufficient parameters specified [ 1604.552616][T29365] encrypted_key: insufficient parameters specified [ 1604.582687][T29368] encrypted_key: insufficient parameters specified [ 1604.642564][T29349] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 06:56:10 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, 0x0, 0xcf29) 06:56:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r4, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x1f, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x11, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r4}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000001c0)={@mcast2, @local, @private2={0xfc, 0x2, [], 0x1}, 0x1000, 0x8001, 0xf7, 0x100, 0x80, 0x240000, r4}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x82, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x11, r5, 0xd4d98000) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RNDADDENTROPY(r7, 0x40085203, &(0x7f0000000000)={0xffffffff, 0x97, "dbcf25b3a8ccf3fc89bd0380499cf0a2aefb2a9aa1ab8472897f4af5077a1c1324df15aa63eaa88e74347bbb4ca752ae7efbc08036d70d5f512a389a9a5a0a56f2e0010c86e758bc24379273df47769fab87f5f20cd35526826dcadf2426db77755d5d349ac91c4aadf51d9200bb2caa1af44ec9813a0bf2f4d86a1698c14b7411262b89de99eeb9e3756c9655e7d4a27b8939cb143192"}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1, 0x0, &(0x7f00000000c0)="b9", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/1059], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000280)) 06:56:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, 0x0, 0xcf29) [ 1605.250228][T29386] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, 0x0, 0xcf29) 06:56:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x100000004001fc) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="6c6f61642064656661756c7420757365723a6ffa783fdd03714d947f950a9d575c86b55577dd5cc479d135569e2581032c0261bf99b0788b41c10522ebd1416586779e296784fb3f600af7d53637de1a3c44df5583903d5c1294fea893ba15a2a229f56626c98217af1b932030303030303030303030303030303030303036352000"], 0x82, 0xfffffffffffffff9) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x6) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000740)=ANY=[@ANYBLOB="50470300f4446694cd569fdaff8f13b7a8f23af8efd2350278a6f266320bb65469acaa3d42cab27d28ba8799a8d3df34417ef82b583de587a71ea23b0bf926345850222fc3eeed8612923d1af2930aadcccaa2db5e19c6167f6950707d35", @ANYRES16=r4, @ANYBLOB="0004262d1900fddbdf250200070004000000000000000c00020026070000000000000c0006000200000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x40840}, 0x4040000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) rt_sigtimedwait(&(0x7f0000000600)={[0xfffffffffffffff8]}, &(0x7f0000000640), &(0x7f0000000700), 0x8) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HW_REFINE(r6, 0xc2604110, &(0x7f0000000380)={0x9, [[0x8, 0x5, 0x1fc, 0x2, 0x1, 0x1, 0x5fa, 0x9], [0x7, 0x1, 0x4, 0x4, 0x2, 0xc8, 0x10001, 0x3ff], [0xffff, 0x16e, 0x706, 0x1, 0x401, 0x5, 0x10000]], [], [{0x3740, 0x7ff, 0x1, 0x1, 0x0, 0x1}, {0x100, 0xcd6, 0x0, 0x0, 0x1, 0x1}, {0xfffffe00, 0xc, 0x0, 0x0, 0x1, 0x1}, {0x1, 0xcfda, 0x0, 0x1, 0x0, 0x1}, {0x0, 0x3, 0x1, 0x0, 0x0, 0x1}, {0xcba1, 0x4}, {0x6, 0x2, 0x1, 0x1, 0x1, 0x1}, {0x6, 0x1ff, 0x0, 0x0, 0x0, 0x1}, {0x173, 0x2, 0x0, 0x1, 0x0, 0x1}, {0x7fff, 0x451, 0x1, 0x1, 0x0, 0x1}, {0x223, 0x9a, 0x1, 0x1, 0x0, 0x1}, {0x401, 0xffff, 0x0, 0x0, 0x1, 0x1}], [], 0x3c}) sendmsg$NFT_MSG_GETOBJ(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="68000000130a01010000000000000000020000057e93fc0900020073797a31000000000800034000000073797a31000000000900010073797a30000000000900010073797a30000000000900010073797a310000000008000340000000080800034000"], 0x68}, 0x1, 0x0, 0x0, 0x4c88c}, 0x2404c8c4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) 06:56:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1605.513069][T29411] encrypted_key: insufficient parameters specified [ 1605.582995][T29420] encrypted_key: insufficient parameters specified 06:56:11 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) 06:56:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a608000000184b759c51160fbcbbf35b1e7be6148ba532e6ea09c347dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fe95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a184222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a46939811bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b95f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859933f75b2042b0ff8c21ad702ccccfe4a5c22793600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000956080d3c9043c1beeeb8fd4c89a6cf44962dc83712a000000000000000000000000000000001481bd6f7acb358d5bc2e8c17644edd7fdab8ddbad2ab6760c4b442da7c02981884b4db49373d03bef363f81539e163ef4d0e0ff85fdd43b60f8e3c4cbe5167b4c234573e5ddf560b7d6058696cf0b4daf53035853e5b9b7df57c3728209037cbb0e8e6e59d960d3cefcc8612f520f9e8e8d2bc99f34e9469f584c47c8e6c4c18afa64e5348d47477a4c935d0100ff2176a9906edc0a3c5e6c449fd53f13ee25f9101e1533318419176df3c2eb5ec4571a8732489a30e4f7a1fe306fdc0c92b10ef909d35d2ba8c5f59d0000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004, 0x74, 0x0, &(0x7f0000000280)="13debfe90a2695cec282fbfe2e81deb7df6696cb95cfc16522662d9806d6359032d48ee0eba414e8a083f8fd60df80fc44a563940a2ea652f3d2248e700778453e16c8abe1dcc797fe118de702ba5ac47df95ae840cb972767b09dc5536e16a1472c4fc933ccbd3c9532a1f5f0cb77b24d6cbe9b", &(0x7f0000000040)}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCGETX(r4, 0x5432, &(0x7f00000000c0)) 06:56:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xffffffffffffffff) 06:56:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = inotify_init1(0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) 06:56:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r3, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r3, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) bind$nfc_llcp(r3, &(0x7f0000000040)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac59de000071d3ed2a4182b96e898cbb38c314ffffff7f0000000769942f46cde79838739e0000de00"}, 0x60) sendmsg$sock(r2, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000000)=0x3ff, 0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) socket$can_j1939(0x1d, 0x2, 0x7) 06:56:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x10, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a80405", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r4, 0xcf29) [ 1606.440397][T29460] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000280)={0x3c20, "79f7fa7476c501b29818f6404324677bcdd2e1ee923176a6d64273cef0c70685"}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1606.502304][T29465] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r4, 0xcf29) 06:56:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_udp_int(r3, 0x11, 0x65, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f00000000c0)=0x1, 0x4) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x216001, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:12 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) ioprio_get$pid(0x3, r5) ioctl$MON_IOCQ_RING_SIZE(r4, 0x9205) [ 1607.307067][T29486] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r4, 0xcf29) 06:56:12 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffff9) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f6164206563727970741547000000000000f57358723a2030303049000000000000003030303030303036352000"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1607.389214][T29493] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) 06:56:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f72d6656372797074667320757365723a757365723a2030303030303030303030303030303030303036352000"], 0x2f, 0x0) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt(r2, 0x0, 0x4, &(0x7f0000000000)="2a46c2224a6b6cd15a7c64a93ba698f5fe29388eb60606ba", 0x18) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1607.493130][T29504] encrypted_key: master key parameter 'ecryptG' is invalid [ 1607.530246][T29506] encrypted_key: master key parameter 'ecryptG' is invalid 06:56:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x83, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1053], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x800}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1607.617312][T29513] __report_access: 3 callbacks suppressed [ 1607.617321][T29513] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29513] [ 1607.633500][T29516] encrypted_key: keyword 'lorÖecryptfs' not recognized 06:56:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f61642065637279707465723a203030303030303030303030303030303635200000000000000000000000df04c4bee430bd8466e5e76fb1237c3919cc94f5"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1607.669145][T29518] encrypted_key: keyword 'lorÖecryptfs' not recognized 06:56:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1607.767278][T29525] encrypted_key: insufficient parameters specified [ 1607.789141][T29527] encrypted_key: insufficient parameters specified 06:56:13 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:13 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) flistxattr(r2, &(0x7f0000000280)=""/72, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000a00)=ANY=[@ANYRES16=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) 06:56:13 executing program 3: r0 = dup(0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x4007) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f616420656372797074665f20757365723a757365723a20303030303030303030303030303030303030363520009c5d9610a18c30040281e9a0a9c2d62755f69734af9cfbd304cc77232a535c964aa3ce323ea3b45820952ed5d4b790d76e66b8125cbd5f1291908d9501ed0bee792dd05a1baf3bfc44de2b5f08e1ecf4dff73cc72f8acbf7fd0e3f9c1a66cfc40dab9e236c5cefb72904c50f3ac1a2b6f370524f5214db230b6b8173c6e464c5853051cfc229c9f7704b6fb8df205635e1"], 0x2f, 0x0) restart_syscall() ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f00000000c0)) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a804", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1608.310458][T29552] encrypted_key: insufficient parameters specified [ 1608.320490][T29553] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29553] [ 1608.349280][T29554] encrypted_key: insufficient parameters specified 06:56:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)={0x8, 0x4}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETSNDBUF(r5, 0x400454d4, &(0x7f0000000000)=0x3e) r6 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r7 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r6) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r6, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r7}) keyctl$instantiate(0xc, r7, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0xfd, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000040)=0x3ff) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r5, 0xcf29) 06:56:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c7f616420656372797074667320757365723a757365723a203030303030303030d4d9303030303030303036352000"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1608.517799][T29565] encrypted_key: insufficient parameters specified [ 1608.557397][T29569] encrypted_key: insufficient parameters specified [ 1608.596190][T29571] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29571] 06:56:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=@bridge_getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f616420656372797074667320757365723a027365723a2030303030303030303030303030303030303036352000"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1608.659569][T29575] encrypted_key: keyword 'lad' not recognized [ 1608.690700][T29576] encrypted_key: keyword 'lad' not recognized 06:56:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) dup(r0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r4, 0xcf29) [ 1608.816651][T29584] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1608.825867][T29585] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29585] 06:56:14 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r4, 0xcf29) 06:56:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) r5 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r5, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r5, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) ioctl$sock_SIOCGIFCONF(r5, 0x8912, &(0x7f0000000280)=@buf={0x1000, &(0x7f0000000e40)="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"}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r4, &(0x7f00000000c0)={0x2001}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x203, 0xba310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00000004c0)=ANY=[], 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r3}) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='load ecryptfs u00000000000000000065 \x00'/47], 0x2f, 0x0) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000480)='big_key\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r5}) r6 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r4) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000280)="084a50975a6507be287193a21822772b2a4554ae7cde1b6cc0a90fccfec89a70c5031eaa88487e19594957d6f7a0c85b6cbf98889ce21066fbf68872a30c00f832bca91d72dbb2d2c0a2cb9141224ab2c42d7d6ed5b6791ea5e8c68bed8b97e4ee7e42ef4b19abf3535a8fbe4bb1a7d1cd0dad307dbfb4f23637f185fb39a4e711f22870b33010f1a2af97f8ecf661000e134b3cb0", 0x95, r6) r7 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r8 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r7) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r7, &(0x7f0000000480)='blacklist\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r8}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r7) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000140), 0x0, r7) 06:56:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1609.228090][T29597] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29597] 06:56:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r2, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = inotify_init1(0x0) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r4, 0xcf29) 06:56:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$RXRPC_SECURITY_KEY(r3, 0x110, 0x1, &(0x7f0000000000)='encrypted\x00', 0xa) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_CURSOR(r1, 0xc01c64a3, &(0x7f0000000000)={0x2, 0x8000, 0x20, 0xb80, 0x1, 0xfe000000, 0x2}) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1609.389022][T29614] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29614] [ 1609.423396][T29617] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f4c7e384dc0846247e9b434616420656372797074667330754265723a757365723a2030303030308bc71f58813a84bc303030303030303030"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xc, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f0", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1609.506824][T29619] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1609.544455][T29625] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29625] [ 1609.613114][T29629] encrypted_key: insufficient parameters specified 06:56:15 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000a00)=ANY=[@ANYRESHEX=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_TRY_EXT_CTRLS(r5, 0xc0205649, &(0x7f00000002c0)={0xa10000, 0x9, 0x6, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x9b0903, 0x9, [], @p_u16=&(0x7f00000000c0)=0x5}}) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x82, &(0x7f0000000080)={r9}, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000300)={r9, 0x7fff, 0x6, 0x400, 0x1, 0x7}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0xf, &(0x7f00000003c0)={r10, @in6={{0xa, 0x4e20, 0x2b5a, @remote, 0x7}}, 0x9, 0x8, 0x8, 0x2, 0xb05d}, &(0x7f0000000480)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$USBDEVFS_DROP_PRIVILEGES(r3, 0x4004551e, &(0x7f0000000040)=0xff4d) 06:56:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$UHID_CREATE(r2, &(0x7f00000001c0)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000040)=""/192, 0xc0, 0x0, 0x7, 0x80000, 0x3ff, 0x401}}, 0x120) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'trusted:', 'syz1\x00'}, 0x1e, 0xfffffffffffffffe) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@type={'type', 0x3d, "0cd36d1d"}}, {@gid={'gid', 0x3d, r5}}]}) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfs(&(0x7f00000001c0)='hfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)={[{@type={'type', 0x3d, "0cd36d1d"}}, {@gid={'gid', 0x3d, r7}}]}) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r9, 0x0, r9) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) fsetxattr$system_posix_acl(r1, &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000700)={{}, {0x1, 0x6}, [{}, {0x2, 0x9}, {0x2, 0x1}, {0x2, 0x2}, {0x2, 0x4}, {}, {0x2, 0x3}], {0x4, 0x5}, [{0x8, 0x3, r3}, {0x8, 0x4, r5}, {0x8, 0x5, 0xee01}, {0x8, 0x6, r7}, {0x8, 0x1, r8}, {0x8, 0x6, r10}], {0x10, 0x2}, {0x20, 0x4}}, 0x8c, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1610.265594][T29647] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29647] 06:56:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f00000002c0)=0x20, 0x4) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x20800000, &(0x7f0000000000)="8dc017a2545746e307dba091b02298896601bdf72439b1e869444ef516293aa2765910dbef948f9ac118ee02a0e845d2f27e01787b9fbc5fc0157bbbd90bb40403b1c3bca6678998286562f74b60de9c3027372a35346e00d85d51a0468fdd1195a19b8c6128c1ac8064d551f36f1f525bd76bf85740095e03dd7405e69dfe0b811e29232dac30bc247e8d3ccf95aac7d7b0483b4aaa96969349245905a606c23c50f751b5edf6dbb77131e4df454bbd3ef25e0deee637bd1c03d726a09de9c85225ca5c45a917bd8d028ae5a4624db5f1338232967e8e978346", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="851be6ecdf6e7d4bf9ed3aa227c7fab36751f399fd5ebb1b79f1da2ce5c643b2e3fbfdee02154ef59508a20a7bca418b77799b58ad9d5aed9860a8d6228301839d") ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000300)={0x6}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="6c6f616420656372797074667320757365723a757365723a2030303030303030303030303030303030303036352000b81f12b554f68ecfe2d1cc140c454ba53371cba5df44cfee292a82583c14c0bd569d8b23b1e1c0b98eb69ca1c5cc3637a038a6296a76bcc7262c5216e02963ef29ddfc478c99ff9203de89e7f0a86c723d55a230150daf6590b858ceafa3d1bca9673aa32c4901f567b6f4c7ed7741668e5bb35942402cc99bfa6a6e1d4e8ee7758ce62e3a28101968af"], 0x2f, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r5, 0x5441, 0x7) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r2, 0xcf29) 06:56:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r1, 0x4122, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1610.460727][T29667] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29667] 06:56:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000000)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', 'H'}, 0x17, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffa) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f0000000040)=0xd8a, 0x4) 06:56:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r2, 0xcf29) [ 1610.502873][T29669] encrypted_key: insufficient parameters specified [ 1610.623052][T29680] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29680] 06:56:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_EXP_DELETE(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x3ac, 0x2, 0x2, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@CTA_EXPECT_HELP_NAME={0xa, 0x6, 'H.245\x00'}, @CTA_EXPECT_ID={0x8}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x20}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x5}, @CTA_EXPECT_MASK={0x7c, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x36}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_FLAGS={0x8}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'pptp\x00'}, @CTA_EXPECT_NAT={0x1c, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_NAT={0x2c8, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xd8, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @ipv4={[], [], @private=0xa010100}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0={0xfc, 0x0, [], 0x1}}, {0x14, 0x4, @private2={0xfc, 0x2, [], 0x1}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @rand_addr=0x64010102}, {0x8, 0x2, @rand_addr=0x64010102}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, [], 0x1}}, {0x14, 0x4, @dev={0xfe, 0x80, [], 0x13}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x64, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xb}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @broadcast}}}]}, @CTA_EXPECT_NAT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}]}, @CTA_EXPECT_NAT_TUPLE={0x28, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x34, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_EXPECT_NAT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_EXPECT_NAT_TUPLE={0x9c, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x8}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @mcast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast2}}}]}]}]}, 0x3ac}, 0x1, 0x0, 0x0, 0x400c010}, 0x84) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='load ecryptfs user:user: 000000000000065 \x00\x00\x00\x00\x00\x00'], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:16 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r2, 0xcf29) 06:56:16 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) ioctl$VIDIOC_QUERYBUF(r2, 0xc0585609, &(0x7f0000000280)={0x100, 0xa, 0x4, 0x8, 0x1e27, {}, {0x3, 0x0, 0x4, 0x40, 0x7, 0xd8, '\t/B!'}, 0x6, 0x1, @offset=0x4, 0x5, 0x0, r3}) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x82, &(0x7f0000000080)={r7}, 0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000040)={r7, 0xfbff, 0x5}, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:16 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r1, 0xcf29) [ 1611.236499][T29700] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6c6f616420656372797074667320757365723a757365723a2130303030303030303030303030303030303036352000fe6549211cfc6eb628d1b462f804d9646bdc552636af8551d0d3684b6bd298813609a2302b02af46f9c66c04ea62ff2ff00250c6808898f704df81965113034691388d14736b925ada13506dd693d5f63007515dbfe688bcb6ff14295137c5047ec1298be3caa7d9d3f87aa08cd1071a6a6d5d9b55cff96619ec00"/183], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000080)={0x10000, 0x4, 0x50, &(0x7f0000000000)="c3b7f820fcba13e7af164eba9b788e98171fdb6e7eee858b4e187b4b1edbf198f845b3879511b3ce28f4d9e39b27665a722a51492a77ada7188c46723cccb40baeba6313b946efec6673854f453dcf2a"}) [ 1611.296738][T29709] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r1, 0xcf29) [ 1611.417502][T29717] encrypted_key: insufficient parameters specified [ 1611.454392][T29720] encrypted_key: insufficient parameters specified 06:56:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r1, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r1, 0xcf29) 06:56:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="3a4acdf6f5d0dfcf5d6e7744caa37456f40df58f28f330e5d5206299d55009f8c2ae73b241e2832e976594e903a39fa947f2dbb6ba8243472889360e40db581fa05d560b9b35c697922e520d3ceffc22a758fb14bf0f408e28c30a898d0de6cf2b93dd3a26358de07c98c9f1eef61805a43ba0dfbf08f8a311c564c9f093266e598e828d3cf9617baa207a51e757260b8fcefc6ed4c978", 0x97, r3) r5 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000000)={0x4, 0x100, 0x4, {0x8, 0x7b328000, 0x0, 0x2}}) [ 1611.677442][T29734] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:17 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xef15628800000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r2, 0xcf29) 06:56:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) getsockopt$netlink(r1, 0x10e, 0x9, &(0x7f0000000000)=""/107, &(0x7f0000000080)=0x6b) getdents64(r1, &(0x7f00000001c0)=""/4096, 0x1000) 06:56:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000e40)={0x16d8, r3, 0x100, 0xa2ec, 0x25dfdbfb, {}, [@WGDEVICE_A_PEERS={0x10c8, 0x8, 0x0, 0x1, [{0x6dc, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x218, 0x9, 0x0, 0x1, [{0x4}, {0x4}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x11}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2b}}, {0x5, 0x3, 0x3}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x3b}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0xa}}, {0x5}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @remote}}, @WGPEER_A_ALLOWEDIPS={0x480, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, [], 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x3e}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0x148, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x22}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, [], 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "1d7896755f6a119df96a35ce638e4cdb01a603be73cb255d8256d48db09b7421"}]}, {0x128, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x57a}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "c58140488ef7430b31de43b28a03b7b47913f039f92d3574e78bd1f12836423c"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x3}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc20x0}) process_vm_readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r2, 0xcf29) 06:56:17 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1612.293643][T29754] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r2, 0xcf29) [ 1612.364626][T29760] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a804", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000080)="c38a82f7db2a60799dbf8b25f13104e8235ca00d6334769c94aec96b58444509651c6c378038a7ab27b214aa572dda792e31fceb5514e6f52f0b6ec5981e0f576294b581eb918da3407ff456dabdc22b093060121fe79035a0c165", 0x5b, 0xa0f}, {&(0x7f00000001c0)="9b35af909879d727c51455cbd52ff0040b3e1cb2e7cf9bec8b0dfba3ec144aa24faa392b0b54a49a15c19044ae630969305eb62cdf5426d24858e34dd007f8bcb6d5cf9ef4594a489b27315b100936bd926378042ddec8df4130d4386b647d9ebaa40566cf29efd65391e7c2f8cbd0d73d0935fcd0cbe4ed7eecafdbf5b47aaf2fd5dc8c991b6ef2a5f02bfc53b63d38189f73e6049bb1715db8eb20e38da7def9cb66cd31ce077156f11937f643dd5a3c1cdfa53560a0a9f8973374e64b9a11e8ec67679df07e24130469", 0xcb, 0x4d}], 0x18020, &(0x7f0000000300)='ecryptfs') keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f616420657b28494385667320757365723a757365723a2030303030303030303030303030303030303036352000"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000440)={r2, r0, 0x6, 0xc8, &(0x7f0000000340)="c092c2ccc68d57d0299a4fa292a37682c416466f739f266a61e02695755bfccff8c25138d1547097562e4c65ce48f36810687ff2b1d06a32d5c6b5958212e3388f33d058a408ebe5ab3caa794d9558a25fa5bf93012bf0aa541d7d1b1d73061dcb56f29b81be76ba9b925f3d99e34dc9f8e68e6edddae7095ad3f67cd6114727000f2dc7feec03ef63613810693c5d358f21b0650217bd67bc60c024f34394a706318609deee3cdc80391eaab2bee4644e3fb87273456c110ad0813f2e01b680aa5854c11f345965", 0xfc, 0xd1, 0x12, 0x4, 0x2, 0x2, 0x7cac, 'syz1\x00'}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x82, &(0x7f0000000080)={r7}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000580)={r7, 0x68, &(0x7f0000000500)=[@in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0xe889, @remote, 0x9}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e22, 0x3f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, @in={0x2, 0x4e22, @multicast2}]}, &(0x7f00000005c0)=0x10) 06:56:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xf, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a804", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 06:56:18 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="3a4acdf6f5d0dfcf5d6e7744caa37456f40df58f28f330e5d5206299d55009f8c2ae73b241e2832e976594e903a39fa947f2dbb6ba8243472889360e40db581fa05d560b9b35c697922e520d3ceffc22a758fb14bf0f408e28c30a898d0de6cf2b93dd3a26358de07c98c9f1eef61805a43ba0dfbf08f8a311c564c9f093266e598e828d3cf9617baa207a51e757260b8fcefc6ed4c978", 0x97, r3) r5 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000000)={0x4, 0x100, 0x4, {0x8, 0x7b328000, 0x0, 0x2}}) 06:56:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000080)='team_slave_0\x00') sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r7, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x1f, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x11, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r7}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000000)={@mcast2, 0x67, r7}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:18 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:18 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x121001, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(r0, 0x4148, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000300)={0xa, 0x4, 0xfa00, {r6}}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f0000000040)={0x1, 0xa1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1613.284203][T29800] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1613.312534][T29804] __report_access: 7 callbacks suppressed [ 1613.312544][T29804] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29804] 06:56:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="3a4acdf6f5d0dfcf5d6e7744caa37456f40df58f28f330e5d5206299d55009f8c2ae73b241e2832e976594e903a39fa947f2dbb6ba8243472889360e40db581fa05d560b9b35c697922e520d3ceffc22a758fb14bf0f408e28c30a898d0de6cf2b93dd3a26358de07c98c9f1eef61805a43ba0dfbf08f8a311c564c9f093266e598e828d3cf9617baa207a51e757260b8fcefc6ed4c978", 0x97, r3) r5 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000000)={0x4, 0x100, 0x4, {0x8, 0x7b328000, 0x0, 0x2}}) 06:56:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101200, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1613.441529][T29812] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1613.476298][T29821] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x6, 0x20, [0x61]}, 0x30, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1613.530536][T29827] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29827] [ 1613.547635][T29820] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="3a4acdf6f5d0dfcf5d6e7744caa37456f40df58f28f330e5d5206299d55009f8c2ae73b241e2832e976594e903a39fa947f2dbb6ba8243472889360e40db581fa05d560b9b35c697922e520d3ceffc22a758fb14bf0f408e28c30a898d0de6cf2b93dd3a26358de07c98c9f1eef61805a43ba0dfbf08f8a311c564c9f093266e598e828d3cf9617baa207a51e757260b8fcefc6ed4c978", 0x97, r3) r5 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_SELECTION(r5, 0xc040565e, &(0x7f0000000000)={0x4, 0x100, 0x4, {0x8, 0x7b328000, 0x0, 0x2}}) [ 1613.683759][T29835] encrypted_key: insufficient parameters specified [ 1613.701614][T29838] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29838] [ 1613.729543][T29837] encrypted_key: insufficient parameters specified [ 1613.765460][T29842] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:19 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000000)=""/195) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f616420656372797074667320753030303030303030b030303030ad1c7234b27660e800"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="3a4acdf6f5d0dfcf5d6e7744caa37456f40df58f28f330e5d5206299d55009f8c2ae73b241e2832e976594e903a39fa947f2dbb6ba8243472889360e40db581fa05d560b9b35c697922e520d3ceffc22a758fb14bf0f408e28c30a898d0de6cf2b93dd3a26358de07c98c9f1eef61805a43ba0dfbf08f8a311c564c9f093266e598e828d3cf9617baa207a51e757260b8fcefc6ed4c978", 0x97, r3) r5 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 06:56:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0x83, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1049], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x17, r1, 0x8, &(0x7f0000000000)={0xa}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0xfffffffc}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_WIE_OFF(r4, 0x7010) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PPPIOCCONNECT(r6, 0x4004743a, &(0x7f0000000040)=0x3) 06:56:19 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1614.324418][T29859] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29859] [ 1614.356756][T29860] encrypted_key: master key parameter 'u00000000°0000­r4²v`è' is invalid 06:56:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="3a4acdf6f5d0dfcf5d6e7744caa37456f40df58f28f330e5d5206299d55009f8c2ae73b241e2832e976594e903a39fa947f2dbb6ba8243472889360e40db581fa05d560b9b35c697922e520d3ceffc22a758fb14bf0f408e28c30a898d0de6cf2b93dd3a26358de07c98c9f1eef61805a43ba0dfbf08f8a311c564c9f093266e598e828d3cf9617baa207a51e757260b8fcefc6ed4c978", 0x97, r3) r5 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 1614.420355][T29866] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x0, r1, 0x10, 0x1, @ib={0x1b, 0x100, 0x2, {"bd076d350309b7a92151b0d63b63cf8a"}, 0x20, 0x9, 0x68e}}}, 0xa0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r2, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ioctl$DRM_IOCTL_ADD_CTX(r6, 0xc0086420, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1614.512735][T29875] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29875] 06:56:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0xf000, 0x0, &(0x7f0000000000/0xf000)=nil) shmat(r1, &(0x7f0000001000/0x1000)=nil, 0x6000) shmctl$SHM_LOCK(r1, 0xb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1614.556288][T29880] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="3a4acdf6f5d0dfcf5d6e7744caa37456f40df58f28f330e5d5206299d55009f8c2ae73b241e2832e976594e903a39fa947f2dbb6ba8243472889360e40db581fa05d560b9b35c697922e520d3ceffc22a758fb14bf0f408e28c30a898d0de6cf2b93dd3a26358de07c98c9f1eef61805a43ba0dfbf08f8a311c564c9f093266e598e828d3cf9617baa207a51e757260b8fcefc6ed4c978", 0x97, r3) r5 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 1614.651833][T29889] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29889] [ 1614.654637][T29884] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1614.762217][T29895] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:20 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="4c45dbf9489cb9746274294168957561642065637279707466732175736572457573aa05000000eeffff4d4a7e3030303030345990106cd867f71945a92aa8623d4941a763a66030a820760445bbe6d9c49dc459d039e652720b2f8309331f53a851c2f94fbaf26c8a4dc94d51f799a3b60f4fbb49f3806b62eddef9db87159473e152897d4d84e28a6871a70586a750deb0e3a7752497cfc138b137131559864d668ab0e70d9fc8a320ee7f633c73bc903b68afb5a84a939f"], 0x2f, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000100)={0x1}, 0x1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xfff6, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) 06:56:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="3a4acdf6f5d0dfcf5d6e7744caa37456f40df58f28f330e5d5206299d55009f8c2ae73b241e2832e976594e903a39fa947f2dbb6ba8243472889360e40db581fa05d560b9b35c697922e520d3ceffc22a758fb14bf0f408e28c30a898d0de6cf2b93dd3a26358de07c98c9f1eef61805a43ba0dfbf08f8a311c564c9f093266e598e828d3cf9617baa207a51e757260b8fcefc6ed4c978", 0x97, r3) fcntl$dupfd(r2, 0x0, r2) 06:56:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d000000000000000016fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:20 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1615.364414][T29915] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29915] [ 1615.378575][T29916] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="3a4acdf6f5d0dfcf5d6e7744caa37456f40df58f28f330e5d5206299d55009f8c2ae73b241e2832e976594e903a39fa947f2dbb6ba8243472889360e40db581fa05d560b9b35c697922e520d3ceffc22a758fb14bf0f408e28c30a898d0de6cf2b93dd3a26358de07c98c9f1eef61805a43ba0dfbf08f8a311c564c9f093266e598e828d3cf9617baa207a51e757260b8fcefc6ed4c978", 0x97, r2) 06:56:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r2, 0xcf29) [ 1615.504015][T29928] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29928] [ 1615.523977][T29930] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="3a4acdf6f5d0dfcf5d6e7744caa37456f40df58f28f330e5d5206299d55009f8c2ae73b241e2832e976594e903a39fa947f2dbb6ba8243472889360e40db581fa05d560b9b35c697922e520d3ceffc22a758fb14bf0f408e28c30a898d0de6cf2b93dd3a26358de07c98c9f1eef61805a43ba0dfbf08f8a311c564c9f093266e598e828d3cf9617baa207a51e757260b8fcefc6ed4c978", 0x97, r2) [ 1615.638866][T29935] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29935] 06:56:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r2, 0xcf29) [ 1615.679864][T29939] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) [ 1615.779439][T29942] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[29942] [ 1615.799561][T29945] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:21 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffe4da577f770000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r3, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r3, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_GET_REGS(r8, 0x8090ae81, &(0x7f0000000280)) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r4, 0x1, 0x3, r6}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r2, 0xcf29) 06:56:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) 06:56:21 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000140)={0x40, r3, 0x1, 0x0, 0x0, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev}, @GTPA_VERSION={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @broadcast}, @GTPA_TID={0xc}, @GTPA_LINK={0x8}]}, 0x40}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r8, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x1f, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x11, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r8}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@GTPA_LINK={0x8, 0x1, r8}, @GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x90) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b00)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080)=0x1000, 0x4) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0xffff0000, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00e500", @ANYRES16=r3, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r4, @ANYRES64]], 0x3}, 0x1, 0x0, 0x0, 0x20040000}, 0x20085) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000480)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x34, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_SSID={0xf, 0x34, "1b251609beb8e391c00e16"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x3}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x24008040}, 0x60000040) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400404c}, 0x4000804) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1616.375614][T29960] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r2) 06:56:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1616.492292][T29978] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:21 executing program 0: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x404000) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000280)={{0x1, @multicast1, 0x4e22, 0x2, 'rr\x00', 0xa, 0x5, 0x6a}, {@dev={0xac, 0x14, 0x14, 0x24}, 0x4e22, 0x2000, 0x1, 0x3, 0x101}}, 0x44) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x90, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1616.552452][T29981] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1616.622539][T29990] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:22 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000080)={0x4, 0x0, &(0x7f0000ffb000/0x4000)=nil}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000040)={@mcast1}, &(0x7f00000000c0)=0x14) r6 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r6, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r6, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) syncfs(r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$setpipe(r5, 0x407, 0xffffffff) 06:56:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1617.388596][T30013] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1617.453533][T30016] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1617.491044][T30022] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x82, &(0x7f0000000080)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000000)={r6, 0x9, 0x2, [0x4, 0xc6a7]}, &(0x7f0000000040)=0xc) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1617.615696][T30035] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x82, &(0x7f0000000080)={r4}, 0x8) vmsplice(r3, &(0x7f00000003c0)=[{&(0x7f00000000c0)="2adbd5b6e2b28f3ff623e28446bdb632", 0x10}, {&(0x7f00000001c0)="9a0dbd195d56f756aee9ec316cb11780c4a6c0105a841cd54a54d4334ad35419ed35f200432271fc4712ec60020f78861efbde3e3b9a", 0x36}, {&(0x7f0000000200)="654633a53d1f985b796f8242a66c8c023b04508bc9a3497e80327bb2b51b62e8ad3f4c95137f639a49727383965f72c39477d9460448266b368d7637ef08b29b8b488c47afcc128b7412e6cb977996ff3b3b009b880f2395e997a16a44844b170ad084dfdaf0fae958902c", 0x6b}, {&(0x7f0000000280)="93240dae87edab173de54ea530e30865a6b6d976eaa8c11356d682b4d40b0c4438d57ec8990b0c88fe94193bbdc5a733d174e93f6b2f2b40e608886636e72945fde65c31b985", 0x46}, {&(0x7f0000000300)="ead72d72f23444e4dff8dd4f9348d1c673008fd030f8d7644a7a68dcec2717659e353be8d47324351ab0dbe494414fc7cef50986c68bb5cca4361511ae54b0cd49e275d0b4494f9ba8d708b3984282e2c32af1d41ffa9e6b9c14275dd23013de9a94405b22ecaf666b0ac44b9256a81f09bd59ba4285e340f84b9334681983430ae374b56f0016d9097729", 0x8b}], 0x5, 0xc) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x82, &(0x7f0000000080)={r7}, 0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000000)={r7, 0x1, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20ncci\x00', 0x9ca82, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='load ecryptfs User:user: 000000065 \r'], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1617.687622][T30036] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1617.721329][T30039] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1617.814382][T30047] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1617.853867][T30048] encrypted_key: master key parameter 'User:user:' is invalid [ 1617.890956][T30052] encrypted_key: master key parameter 'User:user:' is invalid 06:56:23 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffff0f, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f6156d5eabe88cb8ce8ad3287a4b8526420656372797074667320757365723a757365723a2030303030303030303030303030303030300010000000"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:23 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:56:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x84, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r1}, 0x78) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SPEED(r4, 0xc0045002, &(0x7f0000000040)=0xa7) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='memory.swap.current\x00', 0x26e1, 0x0) r6 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r5, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r6, 0x0, 0x70bd27, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40800) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r6, 0x100, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8040}, 0x40040) 06:56:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1618.446900][T30072] encrypted_key: insufficient parameters specified [ 1618.475432][T30075] __report_access: 6 callbacks suppressed [ 1618.475442][T30075] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30075] 06:56:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000480)={0x53, 0xffffffffffffffff, 0xb3, 0x4, @buffer={0x0, 0xe1, &(0x7f0000000380)=""/225}, &(0x7f0000000280)="9d476bdadc0ba6893b250538871135abace2416560ccfee6abacbc6c72ee855f9af31270dabe10138af2801f850791341789652e181d89318b5e719ec04d18ad80fb4e4dadcda89833aeb95fa525e6a614d806f3d0a22bf6387dea57540eebc571f6595abddb63c6088a0c167ac16e5b067f825728568605a877a34056ed1c860fa6bf634ead9ef0d49c5efc45ff2443035885561782f8beaab394269a44b580e745fd7ae9fb45aa2af3eb85846c880c8b9127", &(0x7f0000000040)=""/12, 0x6, 0x20, 0x1, &(0x7f00000000c0)}) 06:56:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6c6f616420656372fe49797074667320757365723a757365723a2030309230304030303030303030303030301b363520000509981f0e6981ccc46beac1c30400ba00803d"], 0x2f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet(0x2, 0x80001, 0x84) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x400400, 0x0) openat$cgroup_subtree(r8, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x82, &(0x7f0000000080)={r7}, 0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r7, &(0x7f00000000c0)=0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x6d0, 0x8a, 0x8, 0x81, 0x79f6}) 06:56:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1618.632048][T30092] encrypted_key: insufficient parameters specified [ 1618.679347][T30097] encrypted_key: insufficient parameters specified [ 1618.721099][T30103] encrypted_key: insufficient parameters specified 06:56:24 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:24 executing program 3: clock_settime(0x1, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c07182e4a230405d656e88ec2734cc5206546f292733a757365723a2030303030303030303030fd2c14b1bf07ac7dc8694f9aa2affa303030309dd5841e303030300000"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:24 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:56:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$char_usb(r1, &(0x7f0000000380)=""/218, 0xda) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x84, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r4) r5 = getuid() mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x38092, &(0x7f0000000480)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@sq={'sq', 0x3d, 0x48000}}, {@sq={'sq', 0x3d, 0x9}}, {@rq={'rq', 0x3d, 0x6bcb}}, {@timeout={'timeout', 0x3d, 0x9}}], [{@uid_gt={'uid>', r4}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@permit_directio='permit_directio'}, {@fowner_lt={'fowner<', r5}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}]}}) 06:56:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1619.458881][T30123] encrypted_key: insufficient parameters specified 06:56:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x84, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x80000001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:24 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1619.509239][T30125] encrypted_key: insufficient parameters specified [ 1619.530832][T30134] encrypted_key: insufficient parameters specified [ 1619.618987][T30144] encrypted_key: insufficient parameters specified 06:56:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1619.662081][T30149] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1619.729452][T30152] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1619.746501][T30156] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:25 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400300, 0x0) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="010061be64206563723c3b698f7cf4b0ffef1dd559503a203030303030303030303030303030303030fe364e2000"/61], 0x2f, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}, r7}}, 0x30) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, r7, 0x1c, 0x1, @in={0x2, 0x4e24, @loopback}}}, 0xa0) r8 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000100), &(0x7f00000002c0)=0x8) ioctl$ASHMEM_GET_PIN_STATUS(r8, 0x7709, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) write$P9_RCREATE(r8, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x0, 0x3, 0x5}, 0x4}}, 0x18) 06:56:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:25 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:56:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1620.425034][T30174] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1620.477989][T30178] encrypted_key: insufficient parameters specified 06:56:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, 0x0) process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, 0x0, 0xcf29) 06:56:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, 0x0) process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, 0x0, 0xcf29) 06:56:26 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000000040)={0x3000, &(0x7f0000000000), 0x0, 0xffffffffffffffff, 0xb}) ioctl$SNDRV_PCM_IOCTL_SYNC_PTR(0xffffffffffffffff, 0xc0884123, &(0x7f00000001c0)={0x0, "2125d942f1008e761b6f8f5bdd0716ff1be643dc0ba03276f925d7bc17f6226a7440ea74471853b7d85bb914f0231158cb09dd38f670b9641a51826edb45e153", {0xa03, 0x6}}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, 0x0) process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, 0x0, 0xcf29) [ 1620.731228][T30200] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1620.858851][T30209] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:26 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x25, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1620.924674][T30212] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:26 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000040)={0x7, 0x7f, 0x5, 0x3ff, 0x0, 0x3ff}) 06:56:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1621.145493][T30231] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:26 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 06:56:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:26 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x29, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize'}}]}) 06:56:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, 0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1621.354044][T30246] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, 0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, 0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1621.530713][T30266] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:26 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1621.727808][T30274] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000880)=0xf3, &(0x7f00000008c0)=0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'vlan0\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x19813}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc, 0x1, 'macvtap\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x3c}}, 0x0) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000280)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000480)={0x3d0, r9, 0xcb1113571f650e4e, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5}, {0x5}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0xdc, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26540dc2}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf438}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x439ca18}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4bb0cdcd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe6d5}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x69ba}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39e3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2889d49c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x50fc996b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xce36}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x408b64b}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2e43}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3bf595cc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x71b7b45f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31d1e51a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x555e4a2e}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x553ee7cc}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x48c2b09c}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2c548d05}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x614dbbdc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1b67e41a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7cdd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x64a5b990}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf369}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xcc, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x11f5350a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x65}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf5}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe8}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5c}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6a23280f}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7c7e9e27}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xce}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x85}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x46}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x68d06265}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x559bbdc4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xdac27c7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x68745710}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ba9e10c}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x294d6e46}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x49647b21}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6c567a7f}]}]}, @NLBL_CIPSOV4_A_TAGLST={0xc, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x1bc, 0x8, 0x0, 0x1, [{0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b7e33ae}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2fc315ea}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf3}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1f3a160f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x34dfda9c}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6eef6042}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x1}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3027969d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x20}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1476cfab}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1d4dbd85}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x197830f1}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x92}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x2e}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x88}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x78}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x27f70826}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2721563a}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x304b9b53}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa4}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xdc}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x76387e8f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x441df3ba}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x543ae262}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x53a9f2a3}]}, {0x34, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x31a2941b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x6cca838c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4b9b55c7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7d6095a3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x50}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbd}]}, {0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1ab1db51}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1000}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x71b7e976}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x24}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa7}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x81}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x93}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x23f0b5af}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7e62c746}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x70473385}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x433327f3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x40}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4b}]}]}]}, 0x3d0}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r4, 0x8008ae9d, &(0x7f0000000380)=""/248) 06:56:27 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0xa}}]}) 06:56:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1621.997711][T30282] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1622.042351][T30281] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 1622.042351][T30281] 0x0000000000000000" or missing value 06:56:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 06:56:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0), 0x0, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:27 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0), 0x0, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1622.221800][T30295] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1622.248579][T30299] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize [ 1622.248579][T30299] 0x0000000000000000" or missing value 06:56:27 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0), 0x0, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:27 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x25}}]}) 06:56:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{0x0}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1622.465622][T30314] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:27 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000280)={0x1, 0x7, 0x1, 'queue1\x00'}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{0x0}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:27 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{0x0}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1622.615878][T30322] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value [ 1622.666375][T30335] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1622.777277][T30341] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize%0x0000000000000000" or missing value 06:56:28 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="b70200000b000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4ba431ca711fcd0cdfa146ec558e24e70ee25a9937f02008b5e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07f34e4d5b318f0ec0efd49897a745f801ff110026e6d2efe31ab7ea0c34f17e3ad6ef3bb62203099e90f4580d760751b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7eaa49c62ba0fe52fa65f1328d6704902c9e7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a17e3c184b751c51160fbcbbf35b1e7bca6b13a14f36758f57e6148ba532e6ea09c346dfebd31a0808b802000000000000ea334d8323893c5337669dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a4ecdc7cec61ce63000000800117009a9ab359b4eea0c6e957673f00000000800000dbfd2e6dfe0ca0423d0aa3334e83d5444036303767ff7f4f29e5dad9796edb697a6ea0182babc18cae2edca9590c35c4a84296017a0000000071127d05dfe363c8e550aae3997de78828e8c3"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 06:56:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:28 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:28 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x2d}}]}) 06:56:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r2, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x5c}, 0x1, 0x0, 0x0, 0x4000081}, 0x40000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = socket$unix(0x1, 0x2, 0x0) accept$unix(r4, &(0x7f0000000380)=@abs, &(0x7f0000000440)=0x6e) accept4(r3, &(0x7f0000000280)=@tipc, &(0x7f0000000040)=0x80, 0x80800) 06:56:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1623.155139][T30356] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize-0x0000000000000000" or missing value [ 1623.171386][T30358] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, 0x0, 0x0, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:28 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340), 0x0, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1623.316468][T30374] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1623.354194][T30377] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize-0x0000000000000000" or missing value 06:56:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340), 0x0, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:28 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340), 0x0, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1623.535497][T30386] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb4cae91ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe60300000000000000f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2389cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aa1c66d3244c782912f1d102c2e643b37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000280)={0x2, 0x9, 0x4, 0x40000000, 0x3f, {r3, r4/1000+10000}, {0x5, 0x0, 0x9, 0x80, 0x14, 0x7, "c31342c8"}, 0x4, 0x2, @planes=&(0x7f00000000c0)={0x9, 0x3ff, @mem_offset=0x80000001, 0x10000}}) memfd_create(&(0x7f0000000300)='syzkaller\x00', 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:29 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:29 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3b}}]}) 06:56:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{0x0}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) 06:56:29 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1624.044816][T30410] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{0x0}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1624.099250][T30409] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize;0x0000000000000000" or missing value [ 1624.160058][T30419] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{0x0}], 0x1, 0x0) ioprio_set$pid(0x2, r3, 0xcf29) [ 1624.289320][T30427] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, r3, 0xcf29) 06:56:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1624.335037][T30431] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isize;0x0000000000000000" or missing value 06:56:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1624.449889][T30440] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30440] [ 1624.472858][T30439] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x1e, 0x0, 0xaf, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x41a}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:56:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0xcf29) 06:56:29 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x64}}]}) [ 1624.600252][T30446] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1624.649344][T30452] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30452] [ 1624.722406][T30456] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isized0x0000000000000000" or missing value [ 1624.765644][T30461] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKFRASET(r2, 0x1264, &(0x7f0000000040)=0xfaac) [ 1624.987244][T30469] EXT4-fs (sda1): Unrecognized mount option "debug_want_extra_isized0x0000000000000000" or missing value [ 1625.055410][T30475] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1625.106844][T30480] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30480] 06:56:30 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2}}]}) 06:56:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b00)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080)=0x1000, 0x4) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0xffff0000, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00e500", @ANYRES16=r3, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r4, @ANYRES64]], 0x3}, 0x1, 0x0, 0x0, 0x20040000}, 0x20085) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000480)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x34, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_SSID={0xf, 0x34, "1b251609beb8e391c00e16"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x3}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x24008040}, 0x60000040) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400404c}, 0x4000804) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1625.184996][T30481] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x203, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1625.293109][T30493] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b00)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080)=0x1000, 0x4) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0xffff0000, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00e500", @ANYRES16=r3, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r4, @ANYRES64]], 0x3}, 0x1, 0x0, 0x0, 0x20040000}, 0x20085) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000480)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x34, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_SSID={0xf, 0x34, "1b251609beb8e391c00e16"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x3}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x24008040}, 0x60000040) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400404c}, 0x4000804) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f00000002c0)=0x20, 0x4) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x20800000, &(0x7f0000000000)="8dc017a2545746e307dba091b02298896601bdf72439b1e869444ef516293aa2765910dbef948f9ac118ee02a0e845d2f27e01787b9fbc5fc0157bbbd90bb40403b1c3bca6678998286562f74b60de9c3027372a35346e00d85d51a0468fdd1195a19b8c6128c1ac8064d551f36f1f525bd76bf85740095e03dd7405e69dfe0b811e29232dac30bc247e8d3ccf95aac7d7b0483b4aaa96969349245905a606c23c50f751b5edf6dbb77131e4df454bbd3ef25e0deee637bd1c03d726a09de9c85225ca5c45a917bd8d028ae5a4624db5f1338232967e8e978346", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="851be6ecdf6e7d4bf9ed3aa227c7fab36751f399fd5ebb1b79f1da2ce5c643b2e3fbfdee02154ef59508a20a7bca418b77799b58ad9d5aed9860a8d6228301839d") ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f0000000300)={0x6}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="6c6f616420656372797074667320757365723a757365723a2030303030303030303030303030303030303036352000b81f12b554f68ecfe2d1cc140c454ba53371cba5df44cfee292a82583c14c0bd569d8b23b1e1c0b98eb69ca1c5cc3637a038a6296a76bcc7262c5216e02963ef29ddfc478c99ff9203de89e7f0a86c723d55a230150daf6590b858ceafa3d1bca9673aa32c4901f567b6f4c7ed7741668e5bb35942402cc99bfa6a6e1d4e8ee7758ce62e3a28101968af"], 0x2f, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r5, 0x5441, 0x7) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:30 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000b00)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000080)=0x1000, 0x4) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28012, r2, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r4 = socket$netlink(0x10, 0x3, 0x0) ioctl(r4, 0xffff0000, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NL80211_CMD_NEW_STATION(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c00e500", @ANYRES16=r3, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16=r4, @ANYRES64]], 0x3}, 0x1, 0x0, 0x0, 0x20040000}, 0x20085) sendmsg$NL80211_CMD_STOP_AP(r2, &(0x7f0000000480)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000200)={0x34, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_SSID={0xf, 0x34, "1b251609beb8e391c00e16"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x3}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x24008040}, 0x60000040) sendmsg$NL80211_CMD_GET_STATION(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400404c}, 0x4000804) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:30 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3}}]}) [ 1625.563488][T30518] encrypted_key: insufficient parameters specified [ 1625.598397][T30519] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) ioprio_get$pid(0x3, r5) ioctl$MON_IOCQ_RING_SIZE(r4, 0x9205) 06:56:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1625.841419][T30540] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) ioprio_get$pid(0x3, r5) ioctl$MON_IOCQ_RING_SIZE(r4, 0x9205) 06:56:31 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}]}) [ 1626.065483][T30553] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$netlink(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)={0x14, 0x6c, 0x11, 0x0, 0x0, "", [@typed={0x4}]}, 0x14}, {&(0x7f0000000040)={0x10, 0x0, 0x4}, 0x10}], 0x2}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FBIOGET_CON2FBMAP(r5, 0x460f, &(0x7f00000000c0)={0xf, 0xffffffff}) 06:56:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) ioprio_get$pid(0x3, r5) ioctl$MON_IOCQ_RING_SIZE(r4, 0x9205) [ 1626.217956][T30563] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:31 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5}}]}) 06:56:31 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}]}) 06:56:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) ioprio_get$pid(0x3, r5) 06:56:32 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}]}) [ 1626.702037][T30588] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:32 executing program 4: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}]}) 06:56:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) ioprio_get$pid(0x3, 0x0) [ 1626.935672][T30597] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:32 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7}}]}) 06:56:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1627.049937][T30614] EXT4-fs: 11 callbacks suppressed [ 1627.049947][T30614] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000004, 06:56:32 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r1}) keyctl$assume_authority(0x10, r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000070000000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) ioprio_get$pid(0x3, 0x0) [ 1627.126207][T30620] EXT4-fs (sda1): Invalid want_extra_isize 7 [ 1627.209036][T30625] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1627.258092][T30631] EXT4-fs (sda1): Invalid want_extra_isize 7 06:56:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000070000000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) ioprio_get$pid(0x3, 0x0) 06:56:32 executing program 4 (fault-call:7 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1627.464969][T30638] FAULT_INJECTION: forcing a failure. [ 1627.464969][T30638] name failslab, interval 1, probability 0, space 0, times 0 [ 1627.478234][T30638] CPU: 0 PID: 30638 Comm: syz-executor.4 Not tainted 5.7.0-rc3-syzkaller #0 [ 1627.486997][T30638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1627.492340][T30643] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1627.497043][T30638] Call Trace: [ 1627.508972][T30638] dump_stack+0x1e9/0x30e 06:56:32 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x8}}]}) 06:56:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1627.513305][T30638] should_fail+0x433/0x5b0 [ 1627.517774][T30638] ? report_access+0x101/0x540 [ 1627.522539][T30638] should_failslab+0x5/0x20 [ 1627.527039][T30638] kmem_cache_alloc_trace+0x57/0x300 [ 1627.532325][T30638] report_access+0x101/0x540 [ 1627.536967][T30638] yama_ptrace_access_check+0x7c2/0x970 [ 1627.542504][T30638] security_ptrace_access_check+0x52/0xb0 [ 1627.548219][T30638] ptrace_may_access+0x29/0x50 [ 1627.552986][T30638] mm_access+0x13d/0x240 [ 1627.557226][T30638] process_vm_rw_core+0x225/0x990 06:56:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1627.562261][T30638] ? __might_fault+0xf5/0x150 [ 1627.566935][T30638] ? _copy_from_user+0x116/0x170 [ 1627.571874][T30638] ? rw_copy_check_uvector+0x328/0x380 [ 1627.577333][T30638] process_vm_rw+0x1b7/0x270 [ 1627.581936][T30638] ? ksys_write+0x1b1/0x220 [ 1627.586444][T30638] ? check_preemption_disabled+0xb0/0x240 [ 1627.592155][T30638] ? debug_smp_processor_id+0x5/0x20 [ 1627.597436][T30638] __x64_sys_process_vm_readv+0xdc/0xf0 [ 1627.602985][T30638] do_syscall_64+0xf3/0x1b0 [ 1627.607490][T30638] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1627.613380][T30638] RIP: 0033:0x45c829 [ 1627.617270][T30638] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1627.636984][T30638] RSP: 002b:00007f2545d90c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000136 [ 1627.645387][T30638] RAX: ffffffffffffffda RBX: 00000000004fa240 RCX: 000000000045c829 [ 1627.653351][T30638] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000001 [ 1627.661318][T30638] RBP: 000000000078bf00 R08: 0000000000000001 R09: 0000000000000000 [ 1627.669282][T30638] R10: 0000000020002340 R11: 0000000000000246 R12: 0000000000000006 [ 1627.677231][T30638] R13: 000000000000085e R14: 00000000004cb1d8 R15: 00007f2545d916d4 06:56:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1627.788751][T30652] encrypted_key: insufficient parameters specified [ 1627.812589][T30651] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000008, 06:56:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1627.919648][T30660] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000008, 06:56:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1627.971773][T30662] encrypted_key: insufficient parameters specified 06:56:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 1628.079297][T30673] encrypted_key: insufficient parameters specified 06:56:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x6, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:'}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000070000000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:33 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x9}}]}) [ 1628.146460][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 6 (inode size 256) [ 1628.181241][T30676] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30676] 06:56:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x9}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:'}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1628.248225][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 6 (inode size 256) 06:56:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:'}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1628.307355][T30685] EXT4-fs (sda1): Invalid want_extra_isize 9 [ 1628.325287][T30689] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30689] 06:56:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) r4 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond0\x00'}) r5 = accept(0xffffffffffffffff, &(0x7f0000001700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000001780)=0x80) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000001800)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r5, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, r6, 0x400, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002500)={&(0x7f00000024c0)=ANY=[@ANYBLOB="19000000", @ANYRES16=r6, @ANYBLOB="000826bd7000fddbdf2502000000080002000200000008000200020000000800020002000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4048000) sendmsg$NLBL_CALIPSO_C_LIST(r4, &(0x7f0000000780)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xbb4289e2ace48c41}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, r6, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000050) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r6, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000080}, 0x4044000) sendmsg$NLBL_CALIPSO_C_LISTALL(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r6, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20004000) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x20000183}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 1628.379386][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 6 (inode size 256) 06:56:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) [ 1628.438049][T30698] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1628.456433][T30701] EXT4-fs (sda1): Invalid want_extra_isize 9 06:56:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='load ecryptfs user:user: 00000000004000000065 \x00'], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1628.491855][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 6 (inode size 256) [ 1628.547291][T30714] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30714] [ 1628.564047][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 6 (inode size 256) [ 1628.616044][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 6 (inode size 256) [ 1628.654230][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 6 (inode size 256) [ 1628.702240][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 6 (inode size 256) [ 1628.736178][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 6 (inode size 256) [ 1628.764843][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 6 (inode size 256) 06:56:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000280)={{0x2}, 'port0\x00', 0xc, 0x40005, 0x0, 0x101, 0xa671, 0x81, 0x7, 0x0, 0x0, 0x7}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000040)=0x9, 0x4) 06:56:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x7ffff000}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:34 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xa}}]}) 06:56:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r5, 0x0, r5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r7, 0x0, r7) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r8, 0x0, r8) sendmsg$unix(r4, &(0x7f0000000300)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f00000001c0)="823a9858301f4b0471f3c9bde9fd52311149e711649d2dafd57244a11534f09882d0e5a0846dffdda80bef9409a5ea024f695b318571970c6e29a0afc8be90d7765984fe8066a7ca6441c0b5249f80f6a428df0a6e632311f95f2dffe7bd6f7783be3f7c843a6e0e55ab3ebe223707efa8e6658fa5b204f03b55a79ec2491e87933fc225ffe45a441c579e3b6ed2dd872c44638308863dea6bbc4fc219ea139d0f1c7afccfa86ad6ef7aa805fcb9d47812c80d4d51d9853b15b058888181abeef764894151899b7a7d72f6b6d3891ff36603a47bc5ad25d3178c", 0xda}], 0x1, &(0x7f00000003c0)=ANY=[@ANYBLOB="20000000000000000100000001000000bfe882765c00d5b1b2b979c8d1ef411a72986628dd9bd89073407762f3e5281dfcc1470c6b3b01f4da739c2674798fecfe978b554ff401525557a03a9fee6b6346d71b62a04748b9028f9bca32f7935a0bb4e76340e937cbd54565fb036b13d25143f1f46f987314429a47c041c452487f147ad79a7769cdaf3f039663e0c0402eaa8d44bf0b575c2112ce60b720aea6d9aeec2188fcb00e600035eeb6c2a4236fdf6ff2fc8de655f70ae0c6b2beabbab11f6a930d3e346d4e89ddd4d18278000c9530", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r1, @ANYRES32=r7, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r8], 0x38, 0x1}, 0x48000) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1628.998212][T30744] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30744] 06:56:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x2, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 1629.023920][T30740] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1629.065563][T30741] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000000a, 06:56:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$P9_RVERSION(r1, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x80, 0x8, '9P2000.u'}, 0x15) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1629.137413][T30753] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1629.162405][T30762] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30762] 06:56:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x4, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 1629.247231][T30768] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000000a, [ 1629.307919][T30777] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1629.415014][T30781] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30781] 06:56:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x10c, 0x0, &(0x7f0000000380)="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", 0x0, 0xfe, 0x60000004, 0x45, 0x37, &(0x7f0000000280)="53d6b32d67dd33529867f03f113da984304873579a934192ec7d742133ba0248ad6f3745418b54bf9d795085a6b838600e038fe9b271283a0f8801b0e9399fd6c4c29ea445", &(0x7f0000000040)="e34e2c02174b8d7a3e2a495e2293373762d76651a6d084a7417adfbd0400400000000f8604ad837dc6608a77122caf343c1c0000e335b3"}, 0x40) 06:56:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000070000000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:34 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/diskstats\x00', 0x0, 0x0) connect$rds(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x36b4, 0x3f}, 0xc) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000280)="084a50975a6507be287193a21822772b2a4554ae7cde1b6cc0a90fccfec89a70c5031eaa88487e19594957d6f7a0c85b6cbf98889ce21066fbf68872a30c00f832bca91d72dbb2d2c0a2cb9141224ab2c42d7d6ed5b6791ea5e8c68bed8b97e4ee7e42ef4b19abf3535a8fbe4bb1a7d1cd0dad307dbfb4f23637f185fb39a4e711f22870b33010f1a2af97f8ecf661000e134b3cb0", 0x95, r5) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x8, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:34 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xb}}]}) 06:56:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x10, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 1629.653651][T30796] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30796] [ 1629.654821][T30798] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1629.680094][T30795] EXT4-fs (sda1): Invalid want_extra_isize 11 06:56:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r2, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, r2, 0x400000, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0xade5909dc1caccb0, 0x0) write$P9_RXATTRCREATE(r3, &(0x7f00000000c0)={0x7, 0x21, 0x1}, 0x7) [ 1629.743792][T30802] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1629.832830][T30819] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30819] 06:56:35 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xc}}]}) 06:56:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x25, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1629.918063][T30831] ptrace attach of "/root/syz-executor.0"[7030] was attempted by "/root/syz-executor.0"[30831] 06:56:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1630.032263][T30842] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30842] 06:56:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1630.089302][T30842] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30842] 06:56:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x3ffff, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:35 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xd}}]}) [ 1630.258273][T30864] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1630.322124][T30836] ptrace attach of "/root/syz-executor.0"[7030] was attempted by "/root/syz-executor.0"[30836] 06:56:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x4000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76006e) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000000c0)={r5, 0x2}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f00000000c0)={r5, 0xc}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000240)={r5, &(0x7f00000001c0)=""/85}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x82, &(0x7f0000000080)={r8}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={r8, @in6={{0xa, 0x4e21, 0x8000040, @mcast2, 0x8000}}, 0x9f16, 0x7, 0x8, 0x40000000, 0x20, 0x12, 0x1f}, &(0x7f00000000c0)=0x9c) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f616420656372797074667321757365933a7573657288b55e714d6c223c30"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x7ffffff2, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x7ffffff8, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:35 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xe}}]}) [ 1630.516528][T30887] ubi: mtd0 is already attached to ubi0 [ 1630.532321][T30891] encrypted_key: master key parameter 'ecryptfs!use“:userˆµ^qMl"<0' is invalid 06:56:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1630.574498][T30897] ubi: mtd0 is already attached to ubi0 [ 1630.588249][T30894] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x7ffffff9, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pidfd_getfd(r1, 0xffffffffffffffff, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg(r2, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x4, 0x0, 0x3, 0x4, {0xa, 0x4e20, 0x96af, @empty, 0x5}}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)="5ba6a0c3937262fc87538b9131bc7676fe4c5de31c2dad037b3688c49a512ac839484ccfac1ec46e934bd80d36da52239190a51ba5804e6d82fbbc29978c259e1f360db3432d47f85f46481f76c63232b9e708200b12900ef68d4de47503de29995cbc7683548632df03854dee1485b358ea053e48deb3fc47f76d660b93d6124e2b88248b787b1235227b832941dfe773a77dd1a213d35430d4b0cec1e35bd8361963cd15d677de825e982526", 0xad}, {&(0x7f0000000080)="c2c39382a078995326d8411e214480a92ae8295ddcc466b038c0956a44121d4bb3851822a473cea8d304de190e047d0fa2733b0db77013588a5ff7dcd1dc14e15cb8719069dc707b4a41ece026276d02a20a26eb9870d6d2f204", 0x5a}, {&(0x7f0000000280)="e33fa2fbe8a4cf31f3a80e1f305dd42a306e7693f9cef18fdc3434fb9e46bfb9a021343dced6079a0476d572b81d6886b9898a8d1ef5fe195aa90f62137e37d909c4bafbb3f5222bfa36cb2fe9044512034f2e5d0c532e42313277ff8e67762dcbcf8f6df14c6dfe209df1353bab4648479ad8e5dc9bfa7d145da0eee5b1fef19fe7712e83bf5eebbb4a9acb36cb7102554d2485d425f7648aa1c0e7b22609ceb649cf1baf890d99fdd76a5d140bc83d3b0f37878b85139e5992f10ef18630c7b08c3a081970283ba9d81ce30ed69ebe02255d54", 0xd4}], 0x3}, 0x2000014) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0x7ffff000}], 0x1, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 1630.735735][T30916] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1630.820174][T30921] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1630.843990][T30926] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1630.875916][T30930] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30930] [ 1630.891785][T30930] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30930] 06:56:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x84, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x3}, 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:36 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x10}}]}) 06:56:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:56:36 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 1631.111396][T30951] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30951] [ 1631.150595][T30955] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:56:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x84, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1, 0xfffffffc}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x2af1) 06:56:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x4, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:36 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x11}}]}) [ 1631.165669][T30954] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1631.214558][T30959] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r2) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000e40)="2da4e4e7abcf53b4978cc21f051c9daa58e41883a9f4814babc017f5b197baeb5703e61118b6c4ebced28c3d28efa5b713028118333eb9aac1823a2463d7802bc81d9f8d30ed321d866b267b3f751e77eb01b9e1e8d6e1c5ad1a4235f28be97ca2910130070e238f9fa561766cd4688f80bac33b7f2c953233ea35bbe0d30b86162bfccacf46a758cdad5ff923f31c62114ae504c219f9c56af68136e3855d96564864f631b4c652d532714820d55d73a5ffd08cf82042a76010855c03b52d918005e59093d38dcece5bdb78a0c083a626857abf9e02bcf721147d5f230bca5e00d8559ea4b580e34d067d8a1939e034126f9b616787364d073e0719bd9b28b9f2b3465c6daa0b3584bcc23c908871aff31a67c2157cf94c8017db0dac9468ae9380e6b67883714a341b3f937286175d88610cb3dcad658b35e8f92e9723c2c244ad959d08a2f9202185b8e0239d871d8b63abe634a1079980cbaf1c08e92d391858b0f3d837c17478c85e1b5244924ecaa05e3f53f110b0fe5b64acba7753d072eae7a42746d39bcefe952e86f282dea05784930d181d537473af621b7a648cad2443df6074511ef56867ddbc9738fcb5e10499a30573f1596417daed7291c957bd2a54c14de0f18ecf9c4b744c676500d94d56f6a59fbadfd98c0de88766d82d5e04a6d2a4e8fc64f8348f064bb9efc3b9397cdf194a2520ec9923145d92997e897502796848801af1f6089304c34323303dc1ca13d9416c083003515c2b1c79c7caf7e1c7f677c7af6c634ff358dc53ad12bfd9e636fbc51a870ee9e75c86d803ba119b461c4fcbe04ab622eafd8d2ff852c93460160a044831e5900af3b4c26f4b57b687569f2642ebb538a593851d30db5ae75a836c358fbd10b30c2fe951b0b176f517dddf838a998c9b602e67d3f3021be2e0f0951d0823f906071d4bfc3fe4b4804036a3bf9befefd739f2508d66052bb6413afe38379e5968a613db8db6120ba7c7951297bada83af560212841bf9a981577f14dbc48a7c1f80d37e91fda41d9d9efd6c683ed3af0104ea78221262c6bfcc6953f2e62e181463e20f3727af6a31a56b20579235b9f871d038984f156e23bc0fa9909f4ef9bdc195434809c0d09457e2a79d4780d0c3d40252a1f38668f99ebe178b440e8f6f1a5259b4a84cb77559c9840142a5a047c91b6ff673652198d294238ed2f907524aa3ef417655bf7440969bc6c685c16d02bae7ce293160d4b0d4d7b6024f9849a154270604e753dd58a5b78875233096ca69b84b5e638e245aa312c77db931b05e22731569900bbedc01121ad6e846968e25a8aea826195588d9b66f6eb7f8d804730aa83e59de6377b6b2c79752f09dfaf4de7becf566fcb778936efb6694fb032674fd6cbf21f054f24d1271f2116fa25f73d51591b136baf271e018a0ee2a6690979c66f2c23a10eb5ebc59c3eaaf4d6097f13bc15370a496c5846f6c232c8a3b28f5c3a3d7bb03ad9d792cebc2462527961d955fb7753412c181295568582aad2fb0a699590ce29a230fc0d415db28091513ee252bd1bf7fea719a66bafeda639af96b76de8ae152ae1584db8d0b158dc71f7e381fd34d8202a3f7cad61d991e33ae98201327ca279b8622659e8ba27da8d519c3c03a14546bd20f830c17f35142bc056fffd540aa6ef31233db1badec526c6732c56cd4e6065a4cbc79518942e717faffdca0ac2700f95a24ef9e6c8a913a84984138e6e4ec4185a805fdcde3458e2d62ea7dda96fb1e088802f5296afa67ff87a201e1e91056356af9198ced5cb2bac911f16d5eb20cd00778281cb61efea291a804740f23955bb32c90c329ed4d0447681a05b72d805ef21b792e9dc043ee6c242e3b17896103a90b4219a3b893c1b3fd5673a07aff54d9566c42a2d042136c592576368c0a3ed8e979bd38413dc25957d13cdfd67ca7545f2cce12fbe90ed9999b998ae34e637e994fa059d6d0e04fcc76b5f41f4a23c78daa20ecc02635011ab1e6e2b2e094b2d5b9defc325121d0381a049856ae78b0cad6336347b6212708d169643841ed198626bf9d2dc8c127a605026fadcddf0d2a7b0b711110495ad38c7483de0249f26d90f393919521d7759add9e6d6165b63ed067852fa3f2bb874421ec5e78d7393960179d8063f80b457e03f304e63e7c01873e359c04d9d31f9acb24cd21c3c8e07d9b265f5c5780f520bb27d6bbe84c502684a2a4d9436a442092992628e6f3ed1ea0a29a2c030f5c79218929fa541518ada28d79cd2472e9b848e58193a04303bcfdd93f3635d6a76a10d5f2e6cd298837d954297dfe15cafb67026346e9ca80ea68f608be8ce6959d483703103a25c4be7636766b3098c400887775499f8c20b758509d66c08e0efc4b0af273b4a98dfdc2f30f21774da1f799ee09f11432aea539cd5cb32cffb1e9241779bc1d7b259bb486bdac01e1fbf3880513a497b52bc39a3f1fa9315d819eb40f090168e87e100e9b68aa58e21289ee48707de471cd3222a9413412f190c7ee90df71acb255e64d6a0ae895bd771a65094d50a2b8cd8bc9264d9604b573ccc2cb1d2845b3674d082c61e4f499b9db05a7695c64ee491d0aca30d23c2ee81eb78eb72eb1e9e817899a099ab4a5113d6231df5f654e2ea59bfe40339736645616fbf2519a196b20731bd7e1c8dddb1c79346b4d99faba4c60c7a22dc46730d0b29582c2380444ae87283af62bb114d1b4d19907b94568de622fca371e2dee38a10377ca22f6f9625a2892b0d31ab48433d814304c9d224a350430d27ace1eded7706bb045745f7db834b66a8dc69a4b740765dd3bb6cac6f48a569dfbcd57b0e8a74f366c24604cb05a6655ab4b0e688167ef9eb33da15c0d41ed8a7a90fc162144f6e82daf470095695f625b1bc3f92c27d1cd8a32d914847a33cc0f3cc37a8a12d72d5ecd33d9fcdb3797f0d742e84fa0ce661bb3445ae199c182bb6933967a7209ce12a3beb1a33a6d238ec373090b16068e68ea4a00b50afe02a5fa24153166181edb66d56dda38021907b7d0307ae41cb61a7b960646d3772f61bdfe964450f05399ea213eee05a1e5980988c369d9bd69b52623e55021553d06882a365adecced1dd2f30a6bdbfdeeaa08e5371d2396180d26b2f63b995ec7877b84c45a25bfe25ad5d5fc9f5f812fe845ca86e03bb6547bc65ec774c0f343512263e38278179f02ff7541fc6af68735c0cedf285ef1efc38cdcb89c4dc127e4ba485a7373daa448403a64501c6264d81c8895052b360b1bdc5581cdf11c8c620c04e711a6e4ef48b0ce8d9a412734ad0a304b7f9db76ee28a90cd181c8469f47276f6f758a2364f9ac352f649431a64cef322dfeaefed40e0d5e15ae46e80151e8b6299eb87b341bdd1976abff293bf1c15891f7eb7bbd6a9f29f9428ce06ce7b8393fc970d616981c89f33a7b76bc81a99043eadad5441e3082b091fd7dd1380273f5120076f529d3ead805abc0ae318c68c673a3d323b4b778e09ab0f94240f5efc320f74313178472611137a26a56298fef8c57358dc142135c3418d469619157c1b63fdef59c074e6f0aeb71ff465f418b51b7fd1e56bded770c6a214b424f970e39f2914e5bcee36e02efe9441983f7b3287a427426a8b706880efdd33f6fb600671db7b7f7a590db5845caa53fd5878ee76831fa51276c318f1df220204bb18f3cfd4239343d641287e7230b502dbf75de7f65573f0f6d093e3d4beab60e41567d6d31d9d87e06b4aba47ca9bd818b7896bb812e51ad155119d8b02cf82979f9cf6ab15880a82ee7acbbfbfde1163d333cafe2814addca938f42a73d5fcb11376477bbff70094ab66764365a18789335657af6f599c9ef4b77e5d6104072df7f37f58199911b952c60bc4164cf53fd8e04ec58facc87f8df98843dce3a4f9dc4fe8180d43fe52103a6426254f1fdc7e55d9ccb2167da5c50846ecbda71f9c4ef782099ca3d87649b26db54d1d9a5b169379b7363a98b22ad03ff6850fc65d99a1f26afefc17672ad0e9b0d822fd7ddc9bbcc65741de42cdcda9c7adcdb7e1daf10616861f1b53732e0e7814e3d0e4e377e4be97b06ffb728ee9a656eafd5c4e6b388c3e96ae5447edf648acdb33f6ea409de1effaf209ae5d6747a9d7a0c02a5e6d5a00c2b4a86b9738d1380d00ce163d53648e9f18d79b0bff34b33255075b2bd6004dc2d800d3f37c0f8f41c81e90fe6635bb9fcce1ef8fd4f758842ce9231fdd0bf12d2b3308b3aa111c7e19914c76aa3a2fc28bb14d7a95129391d0883b70edb02f117467b235b1f40bf77da83889fc3c5af04b2a5b3011423aa6775f2d9f5d481e50552b2520c450cfd66eac038935b445e81b667ff5c102d95c7b968d2608aae8af82bec33e4a659ce8a8c4555e154a47121e4c2a6b5d3047f1387a983f98ac1f17b6c5337c85c8bc13c1cf96f670d7fbf2fdf2c439d0232c38dc41c783a0f8a4539fa6dca08c7de7ef29798fd6105fcea9221fbcc8ddd37ba3d694fc5b1c18616a53ffbf32ba119aa72f19afa0e18d00133977c05c765bd33dc918c1e61177f8d27559001a7d30e9b60d4d6542222b743eb9a893b6c73bbaf026dd8566d284d34380372caad79f93319de4728fd7f0f00cfe8045a63face19f15b92e4322bfc23944792b193a54f1a4f5a3bc066f16c4dced1ea0a76024c908a8901f8005bc335b85f690d27377e3c130aab5854fcda2bbee49e3a37d2655d704669f83e24e4d56a26e2c8bb9d84ece9c5477dceb9757b02e10b84c81264940e184133e76228e45652e878f92837f66cdb6cf710b4bc29dbc7ccd79694370dcb010c718ff0d7bd36846a531ef1d40c694f3d4413ad7333c06c9761b97118dad4cc21b81410e5ce6114cefa678b5f67820b22fb921735a40ad21cd68fa68de5188090ab5b768ac1b67aca5cfd58a3fa422ad90a5a5a92868cde7e8e9c0d31ae7125cb99ece61c2229200968aff7416eee6111e2248c17ec54c2f9594f1807634f1c742e0e9d8b3a5b46a187e7778bae16d2cf781a8b15fdb11e0842b4ded8747ac50cf9206bdd99cdcc0111cb6ef669226398e86b6c05c003d758664cacbfb0fab53c9939040facdeff7fc8db59aa46f6851dc4abe1111d807efe8c29e4d6a1f57d8c5658c1aa8cb18e1456a408d1ec6e91a0e107bd113d96fc15f99d1cd29f6c5fa562dba2a9b17c9e19c92ca3819de88b399fccc44f69739e83b6733c87abb5d2119dcec2387b5fbca08c18133fa3572a22130cc88217a333cb84dd6bfa62ef2b9f2c765418a1105e09e5231b77ca0211f007b8db25aa90e2be676f201c31be5ea30319e49fdc70eaa887466a7c24461a232c9fe9d0be4414fc8735d7a17ed82e36c3a3ba92bd2c50b624fa58c28a54da068246deaebec1c75c78ed94bb583fa2f1208f9a083d53511fa025b37a395941293f2bd7afb93457077d95870df8c70aba0610a8904dc38691f5d045efd99f41de3a183814cf94e349d3c3a9639b9289694fe0a814b55523308221690f15fc213de347b51f796eab888a58e0995c657099a13ccaf2c99cfff94d210b58f5aa17a80a6fa5de68a61ac851ab81f101d4428377b4b1a9b98056674f54082971610d4fe057343d4b5c5b31689e8cb74dbba86e097535ace86a9bacb4bd0562574e5c22bfe1228df468dd35a0795a1932cb0e937ff890985c3f0b35cd59332c8570fb92b6a09d185039185c51f86f4550f077c2473d75a841d3031f5412854f338a0b19d8ead96ead9f493745db784", 0x1000, 0xffffffffffffff01}, {&(0x7f0000000280)="98c1449c1918efd7308bd4b8b2220851bc1efbbad5761eb6f14db062547f9d8d93dbfa764e6e5ec69d8ecee822894e510ccdfd11de7a92ee6037fdcc7a3726016366b215b4f478a7e620183cb0695d5d36d75f", 0x53, 0x8}, {&(0x7f0000000380)="a6e4f154eed357fcd53e95f59cbb00e68f50d428af690e55645e9e0cc53aae6b0e10e6f52ad5815d393ab45c8f796e2172f58d5cf2a388ee281243aaa1efeed5398b1f1c0fec960b1d561606925ef6c8965b6967343d4808549d19fa4ceb6e3cf0e529ae40a8282a652540af801bdf49e604447fa0bfab2b1b909d0eee26792896178e908781cd99464753802ac7b128ad", 0x91, 0x1f}, {&(0x7f0000000440)="00cf82e5f2937803d038a7efb993e6a5143324ffcfb0d3e4d2e7c2147e7e37369edc34d5c260bd7301afe916fb4592626298bb7f582416afff5f63dfdc5c4f58f1665ce1a90ac80a924e5c145d6f1da39d0620df8fc95b6ab7662343772bf58c60697773d6f92812dc333e936f30d9ba8db3336bb04384635fece73443ced62daf74820c67a0479ad9d805e8d32eb369bc9ba5b958910c929233ee79091f9a74d1ed16b80f02207d77d8b245d690113fa2350a6402cc09b5dc17b2f9a41eb1ac60abcce96791db630b950003", 0xcc, 0x8}, {&(0x7f0000000540)="ee65efe2ea420f38a154ae441d4450ccc54417c5311fdf17a6261f215b133524fefb772d0a5b62464c34e4222e13c85ce44d91c0014cca807e7125344f22264368a81d918b2bb07f35c2149b7c47a75fd5e807af", 0x54, 0x2}, {&(0x7f00000005c0)="53cb696734438feecbc64487b37b9bc1651956b8a7c2fc7d98ee09837c9410d29d78ace49efd92479976a17c2751a8d1ccd4287bb7d038e5e8e883bcb9bc04bcc70ea55041a8feabb1db34e584fbb16aebaf31ab6a25b961a5d8e3fd7a7b103e45249c0e3a1f9a36896a24282a12b6d14091e34f8a06f0565e87c9b93552e0bc344e684a94fcd8283fd0e7d436e81c35e621de79d3baf6a8b1fb0acbea09f67a5d46a1fc67cdd0f6e1af8bbaff0f59a23b7a7118e3035973ffc9e06de4baff8ee9f87ad3c93be6b70d528e11839f944f326406b52412d434024d26", 0xdb, 0x4}, {&(0x7f0000000300)="34a52653ade4ed29688008c886c6c24e496f11b2a49803ba3a6c58a85f2839db2bc8c23f1ece0cf4dc8e1755dee26bf1d9588dad6c25065956", 0x39, 0x20}], 0x804000, &(0x7f0000000780)={[{@decompose='decompose'}], [{@appraise_type='appraise_type=imasig'}, {@subj_role={'subj_role', 0x3d, '\vvboxnet0posix_acl_accessvmnet1('}}, {@seclabel='seclabel'}, {@obj_user={'obj_user', 0x3d, 'syzkaller\x00'}}, {@hash='hash'}, {@euid_lt={'euid<', r2}}, {@seclabel='seclabel'}, {@dont_measure='dont_measure'}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:56:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x8, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 1631.318106][T30968] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1631.343855][T30975] ptrace attach of "/root/syz-executor.4"[7400] was attempted by "/root/syz-executor.4"[30975] [ 1631.358624][T30973] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000171baf7b, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f21b6e2e62c70854474667320757365723a756f65723a20de303030303030303007000000303030303036352000"], 0x2f, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1631.393365][T30981] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x10, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:36 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76006e) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000000c0)={r5, 0x2}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f00000000c0)={r5, 0xc}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000240)={r5, &(0x7f00000001c0)=""/85}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x82, &(0x7f0000000080)={r8}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={r8, @in6={{0xa, 0x4e21, 0x8000040, @mcast2, 0x8000}}, 0x9f16, 0x7, 0x8, 0x40000000, 0x20, 0x12, 0x1f}, &(0x7f00000000c0)=0x9c) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f616420656372797074667321757365933a7573657288b55e714d6c223c30"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1631.464264][T30992] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1631.500161][T30998] encrypted_key: keyword 'lo!¶âæ,p…Dtfs' not recognized 06:56:36 executing program 0: openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x88040, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1631.568400][T31012] encrypted_key: keyword 'lo!¶âæ,p…Dtfs' not recognized [ 1631.592401][T31011] ubi: mtd0 is already attached to ubi0 06:56:37 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x12}}]}) 06:56:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x25, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76006e) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000000c0)={r5, 0x2}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f00000000c0)={r5, 0xc}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000240)={r5, &(0x7f00000001c0)=""/85}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x82, &(0x7f0000000080)={r8}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={r8, @in6={{0xa, 0x4e21, 0x8000040, @mcast2, 0x8000}}, 0x9f16, 0x7, 0x8, 0x40000000, 0x20, 0x12, 0x1f}, &(0x7f00000000c0)=0x9c) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f616420656372797074667321757365933a7573657288b55e714d6c223c30"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1631.636450][T31015] encrypted_key: master key parameter 'ecryptfs!use“:userˆµ^qMl"<0' is invalid 06:56:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) sendto(0xffffffffffffffff, &(0x7f0000000000)="f9dcc2ef67228cc9cef15156d9e87b5792c49ec3da65903efca1b6bc0e3e5f91ffdf9dea9905d234ae82bde209ca3e2005a4160ff28c0ec141188ccd6da7dcdd98ef3087e5a777c5a8d232a25273ee0a254e52bab455024a1a5a3dd357d017f7163a", 0x62, 0x4040, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x5f4e0316e45711e1}, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f00000001c0)='syz1\x00') 06:56:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x3ffff, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r4, 0x40186f40, 0x76006e) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f00000000c0)={r5, 0x2}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f00000000c0)={r5, 0xc}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000240)={r5, &(0x7f00000001c0)=""/85}) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x82, &(0x7f0000000080)={r8}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={r8, @in6={{0xa, 0x4e21, 0x8000040, @mcast2, 0x8000}}, 0x9f16, 0x7, 0x8, 0x40000000, 0x20, 0x12, 0x1f}, &(0x7f00000000c0)=0x9c) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f616420656372797074667321757365933a7573657288b55e714d6c223c30"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1631.739795][T31027] ubi: mtd0 is already attached to ubi0 [ 1631.756608][T31028] encrypted_key: master key parameter 'ecryptfs!use“:userˆµ^qMl"<0' is invalid 06:56:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1631.821357][T31033] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000000)={&(0x7f0000ff9000/0x4000)=nil, 0x0, 0x2, 0x0, &(0x7f0000ffc000/0x3000)=nil, 0x2}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f616420656372797074057320757365723a757365723a2030303030303030303030303030303030303036352800"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1631.868684][T31038] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1631.910819][T31049] ubi: mtd0 is already attached to ubi0 [ 1631.928545][T31049] encrypted_key: master key parameter 'ecryptfs!use“:userˆµ^qMl"<0' is invalid 06:56:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x7ffffff2, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:37 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x25}}]}) [ 1632.034184][T31062] encrypted_key: master key parameter 'ecrypts' is invalid 06:56:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x24801, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r3, 0x80045530, &(0x7f0000000000)=""/108) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r5, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="20000000040801000800000000000000020000050900010073797a3000000000"], 0x20}, 0x1, 0x0, 0x0, 0x20000004}, 0x8081) 06:56:37 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x11}}]}) 06:56:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x7ffffff8, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1632.077900][T31063] encrypted_key: master key parameter 'ecrypts' is invalid 06:56:37 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x48000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000040)={r1, 0x101}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x4200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) socket$tipc(0x1e, 0x5, 0x0) [ 1632.180484][T31077] EXT4-fs: 12 callbacks suppressed [ 1632.180493][T31077] EXT4-fs (sda1): Invalid want_extra_isize 17 [ 1632.230807][T31086] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1632.309219][T31097] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1632.319794][T31075] EXT4-fs (sda1): Invalid want_extra_isize 37 06:56:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x7ffffff9, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:37 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x11}}]}) 06:56:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) r2 = dup(r1) sendmsg$rds(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/237, 0xed}], 0x1, 0x0, 0x0, 0x80}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x220000, 0x0) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000000540)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) sendmsg$IPCTNL_MSG_CT_DELETE(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, 0x2, 0x1, 0x5, 0x0, 0x0, {0x3, 0x0, 0x4}, [@CTA_MARK={0x8, 0x8, 0x1, 0x0, 0xa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x8000) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) signalfd4(r0, &(0x7f0000000240)={[0x10001]}, 0x8, 0x80800) keyctl$instantiate(0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x2f, 0x0) close(0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:37 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x101881, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f00000000c0)={0x4}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) 06:56:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x2) ioprio_set$pid(0x0, 0x0, 0x0) [ 1632.466015][T31105] EXT4-fs (sda1): Invalid want_extra_isize 37 [ 1632.487096][T31108] encrypted_key: insufficient parameters specified [ 1632.543199][T31115] EXT4-fs (sda1): Invalid want_extra_isize 17 06:56:37 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2d}}]}) 06:56:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x3) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1632.601987][T31127] encrypted_key: insufficient parameters specified 06:56:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 06:56:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x4) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:38 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x11}}]}) 06:56:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x84, &(0x7f0000000a00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831abef01000017e3ad6ef3bb622003b538dfd8e012e79578e51bc59249aa71e40423193099e90f4580d760551b5b341a2d7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbcbbf35b1e7be6148ba532e6ea09c346dfebd31a08b32808b80200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc18cae2ed4b4390a29a119ca3c972780870014601c3c975d5aec84222fff0d7216fd5035afe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbaebff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992533ac229f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960ff27c10223fdae7ed04935c3c90d3add8eebc8619d73415eeadcda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398c88607a67e18c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359435f81b7aded448859968ff0e90500d0b07c0dd0049681739dc33f75b2042b8ff8c21ad702ccccfe4a5c227936000"/1058], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000004}, 0x2c) [ 1632.760968][T31143] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000280)="084a50975a6507be287193a21822772b2a4554ae7cde1b6cc0a90fccfec89a70c5031eaa88487e19594957d6f7a0c85b6cbf98889ce21066fbf68872a30c00f832bca91d72dbb2d2c0a2cb9141224ab2c42d7d6ed5b6791ea5e8c68bed8b97e4ee7e42ef4b19abf3535a8fbe4bb1a7d1cd0dad307dbfb4f23637f185fb39a4e711f22870b33010f1a2af97f8ecf661000e134b3cb0", 0x95, r4) r5 = request_key(&(0x7f0000008bc0)='user\x00', &(0x7f0000008c00)={'syz', 0x1}, &(0x7f0000008c40)='ecryptfs', r4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000008c80)="89af333f489ee18b4ebc0246cd46d2e01fc80f3201af92db1b5b454f43f7d65dfad98227ca4800d80fda5df2793308233ed01eb0f6052783e51467e36ada4e760e5c77242cf52586eedd8df0c8bf3ae025d5481877efce6e7e43c29c3f953169e6b55c0068911f06f6b470f0e8c65190700e9e41f06b5693c70aced1bdcfdfb00185cf0f65175399fcd26b3032c05edd3637d6b40587754e771406fd8ca0540524e79ab168c0ebf871d0ca77d63515c51af96a8bc05966d2f034f8542f816d41a3394346", 0xc4, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = accept4$inet6(0xffffffffffffffff, &(0x7f0000007b00)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000007b40)=0x1c, 0x800) getsockopt$inet6_tcp_buf(r7, 0x6, 0x1a, &(0x7f0000007b80)=""/4096, &(0x7f0000008b80)=0x1000) sendmsg$SOCK_DESTROY(r1, &(0x7f0000007ac0)={&(0x7f0000001f00), 0xc, &(0x7f0000007a80)={&(0x7f0000007800)={0x244, 0x15, 0x200, 0x70bd29, 0x25dfdbfb, {0x2c, 0x8}, [@INET_DIAG_REQ_BYTECODE={0xb0, 0x1, "7b5ee8f4c2834f383d264820ed5927411099a9b68dda4c3a99f692415e3a85b7c884c03bf3aca4c4be06f0e1abaca74551406e7fe07f5afb42fb44aa8b941d47984332051d46fd1aff149c1173a917232b1d17e095af7e6e666bbdb1f3e872b8e7ed8df8b9200734d4b5c25b2556b54db4772161e5b748c153a64824b52a1826959f923e158faac550e0f390895884740c983e7ae69f8c364487e2c3a3538bd84dc540fa17ff2b7c15dcce8a"}, @INET_DIAG_REQ_BYTECODE={0x5b, 0x1, "cb27b16b93252d0dc21068a53528fddb130e706e1f99676b33417b995dbab2ad3f55c224f8f3f94862b1fac30918cbe4015a71a0bcdf918bb9fdf1863a40546e7702a8444ae7b3b9135cdbc7c0aee659e4c146e027520e"}, @INET_DIAG_REQ_BYTECODE={0x34, 0x1, "7c37e5bc56a83ba53b1644c1aae23a4e2cd66c5bd09701fa2b934c71ce452fbca39b2ebc05952d0964ec0fd7d354e387"}, @INET_DIAG_REQ_BYTECODE={0xed, 0x1, "d350d29b2f7297cd0c001d92a894a1470356d7375bd5f23e8ea173af95bd2dcca19bc4fc065fa8d4fded18ffbf28d74fb92c0b71adde72ee26d440574f9c885e6da6629335c58a06bb3452aec32b77e11d2986fd98d23c3e844e2358520a0e5e5cfc942c7b73cd16d55f07d846eed0b11fa9c1b3d95317cd9377ca7e45619950d12c7b72df699fd95a6e8a919979ba5b00576c0cfab75bf2c60bf4d3893b5fd8266001b565c46d9c1a1b39e498ad9e26aaaf9b8fa4ebef21cf5b2acb80760258e9ba9b8ef895032c2e7f2c7232ecee5a92f80e53e5512ce77177e6741bffb57ce76c80fdc9c9e22599"}]}, 0x244}, 0x1, 0x0, 0x0, 0x4040000}, 0x2000c000) openat$udambuf(0xffffffffffffff9c, &(0x7f0000008d80)='/dev/udmabuf\x00', 0x2) r8 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmmsg(r8, &(0x7f0000007600)=[{{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000000)="d13c524c04ea91f8529e873c8cc7c7be4e823384842f3d2e71bfcb02ba417e30fc614398952f48862ff8180cf7edbe1e6c3f8cf63f95776f9046368f", 0x3c}, {&(0x7f00000001c0)="d36d14e731df60e0de2a9e9b907493158d1308b575bbb6e24a703dede3695414f652a3efd0e67fc692ba0e666d453d24aac516bf5e90392302ac28594b9abdb7a19c1a5ac98565430c0efd685fbb4a5268606d05f9e8c48b35c695ef78d967a39e38c271bd6297fb7c2eb87d4b9a569bed104ae74f7b7e05de88b4b261992faa573b5606bb45837c7f62bd3a05d6c0195df6f33cc7a7fbb6b44d2265a9b5ef97a62c0e39744ceca600ea87eae65501eb017a11eed4dcbd470a41f75c8946598e4c2ddc773ea08880168ac94903dfc5dd85587dc1bd2ece95e63674b2aadbd18f5f779fb2e01cfb", 0xe7}, {&(0x7f0000000040)="4a9b4689", 0x4}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000080)="ef7838f268a5e79870dbec2906898aaaf4887f0ed1d6fea475b1745f1b2da0c39f7317c1421f975d766f2d93923de7933ec69af75f76f413d7de11a10d97494f6cdfeb21b12026824f6a750a144e9029225617f7a30d1587de", 0x59}], 0x5, &(0x7f0000001340)=[{0xc0, 0x10b, 0x800, "bbfa196b44a94ebaefba1367cfd32359e1ae63494a8d66a1cbd64c950fb1207f4fbf36227178271ed66ca19c15b10b74960ea9771d139f4f0791eef30931a9d94cd957657340f7d98c6f8a457a030035e4389a3fbf256f34e2704894a2a00ac34fab1ae675535781e3e3b3a16caa3bd6de86a94243534abbfbce272e9f46fb584bd293cff20c306d3860c1bafff66431cc3da615573156af85b5ef2ae5e7118fb3cbc1fbc5d4dfc77cd629752efed5"}], 0xc0}}, {{&(0x7f0000001400)=@in={0x2, 0x4e23, @broadcast}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001480)="2c285e053d0928edf95e9c20d733df863ea1b6e86fa39f0f40a3ffe0faba199b6c41d2f4d897ec0168f91fd108c23b970ddf96a47af6bc20512804bcfbd9ef6b79f222eb844efa9eefb588e4155c22ab3b4898b9d00a05fbc692bf3d3408bdd5aceda28c615d2f3ed7ec5563cc0874b77a02deb793ee4ba92cbc3f7c9f9b043db89dabf5cbc2ab4c69e3b277d780", 0x8e}, {&(0x7f0000001540)="e3d042667e8e42238dd8a8", 0xb}, {&(0x7f0000001580)="21860a86ae32e78798410b2660fd518c9d81eb5d63809de24f46b1d0d8fb83fd833ef8f983fa3123501afac2b2d6cb27", 0x30}], 0x3, &(0x7f0000001600)=[{0x18, 0x6, 0xfffffffa, "6dc0"}, {0xe8, 0x104, 0x8000, "105dcb5ebdd50b6de287b604f6ebb980f1a3205e635fa8bf00ce9f8fd833c2a0286d498734e2cd3255fcc2ce5461c9ca360b12a2b20154307eec99feff8588026f92ffd778df5be55d04f1f0db79a1eb8776ef5bac72f9089d2d04a0b1a9d037d692fa7d651dee523e1924129a120676cb03adb9991a68db2bf7b89e44c1618a1fb3281c95b3be8eaf23abac9b1ec30e0784f28ac322ef0df30624186dff44b3e289b422e22cb597a0e2e65b0eb1de440ee330305d12244f15ebb4397dfd36f4a77be78c12cfe953d03c9988526f8ea136121e"}, {0xf8, 0x10b, 0xffffffff, "4ee68a07f89392e76f169799802ae208edcbe480a4742de2904dfa6b3b57752d4b4aec03a2a524aa8e77ba839d87eb9e3c76b0688fad69f0f2e336df37e8da9e5aec9cdff73dea08eb0354195a8aa65af03f6e69a1d307759d24622c2f07b52283c92c6f446fefa76a88b0434883b474b2e857a38f8b44a056ab31e4b96db1a3171a864c7f23cdccb3121cafc6efcdf67998f77188aa8d7bf4904741120cf8af274effe333f83ad1504bcf97c7dee7c14284d9cdc488d686b2674710ac15943d9416cabf8997a2b89487e9c34469960400afbb791f9cd54fa11cefdd854ac33ac25a6a05dc6ca5ab"}, {0x50, 0x11, 0x1, "bd39007175b42e6bd7603fc4f16d3f86d54bde3b70a1bd2751e875fb64ed818f44b0313ddd3bd942e6ea0e957fc54c8598b057fd24f7cb89ae"}, {0x30, 0xa, 0x0, "df9312ff3ac83d051099c6537280192e7e9aaa77567099623535e3"}, {0xd8, 0x117, 0x5, "0b95bc2cffe13011872e33d20e850b8636ed5b54bfa73c7ef055be9e2a88850fb4b5616597b283de6236daa4263295ba3ae4afdfcb8dcc81b1ab88fab26d1fe6e17fa66b78c0d1f152169673d5c2e53260a195344d6b503de4cd964c66ea31d484b145a3e3bce3b75938eb26b780c50a06256bfc91ab55c28c8974ee3aceda93a939df3c8b288dba40027797513a05c607249ff7d481d6d5d8bd3671629adc2852ccce71f88f219960db07f6234ecc7560c94af73beb2e76c6d595512c29deeea2a4727166c8dd"}, {0x108, 0x6, 0x1, "7de2abd4a71310ac0407ab95d9f650f70b2ff411027b955ae7948a6d35491158991a63c9a7952f1b3cd2e967e891015d682df41da5fa237fb5a14c7e7234f147b009ea0e8f2e2a7cc285a9ff59d0f889d9927ffe4d1ef7018eddaa3c67ff36784363ca558995b9bd9a1fb443811f329931229ae7b691209a0c352f55a2ad8d4f8352ade115e5331d821e4c96598c11a1a51185dcb7f301812c504ac119d28878143d89443a68159b13a69dcace9a4b56864839c845bd7171527941e5b367d10432e46db77fb8d5fc530e6f46788804a93a1cdac825cca56c9f9c1d32a41fb5f51654a5f7abf669a90df09b34b7649635ea61ecb0cf73"}, {0x58, 0x109, 0x96a, "c007e5cc9da78014d18bac0e68d2e98756b2c732015c0417680902a689b544306687b7aa003247d44f5ea388982ee5f89f394952566c2447e5ccd61391a2195e32fae0d465659f"}], 0x4b0}}, {{&(0x7f0000001ac0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x1, {0xa, 0x4e22, 0x1f8000, @private0={0xfc, 0x0, [], 0x1}, 0x7}}}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001b40)="0caf518e11266c6251542cd2a2dfc2fefdf9d02d1935e45740ca7bd34729863dd979d4", 0x23}], 0x1, &(0x7f0000001bc0)=[{0x40, 0x112, 0x9, "066514c795c66e1dfa4d2baf049a4950aa9e5d2d89700bec93c7e4322caae9a63f6f69451963b07203ec03076378a367"}, {0x30, 0x110, 0x10001, "fac26bbca0e6f3970592ffa1aef97afa30bf82d447fecc6f4dc126ce"}, {0xe0, 0x11, 0x6, "bd092c879fef38cd67b14531547358263dbf8720178507286b221bd30352e22620e4cdaf0f28ebbe5170c3bb78b703137f260fba0209b5fd670285612dfe598b3409fb4332febbd6b743ed25615945a21344a5ed6965cea7daa7064efa608ee11da426d81752a5d580a1f1bd35f8f9f084fd78971b7b3951002ccd53b1692df6bee1bc3ca32fe7fa5486a29a689c907cf81e4b10377334ea07e3d27da1caa1a4cf5dd181d6646b2bfb4eee92210653a04dcb58b6617b5329a2ce5d92e9cca3577f7212bc8e8d0bdf5d"}, {0xf8, 0x10d, 0x800, "dcc34eae1cd9ecf1b8a4c4fe73c9f1fd634832fe76b74519f105daaf38547704521bf0de2d6101c4b5b8b4b64b2822be79dd858549d7dbfaee4fe292e3d5d1f43f8c55000bd0fb266ac8fd1ee8b6f1ca2476a35d2387b209edb4cfd6f057e6e91a6717137d495d2339f84ad3870cdc58a989cacef3af93c900e7e1e1e7d12d458e03d23fc04694af169e75089bfc4fee9bada2f7394a8ee62846868057ee792f8477edba4d77044ed71257227edd4cfc811be933fe634eca92c98fdef168b6f0ce5052f129f0f1af169dd2a74f2dc94a54e0a6a7438499f11f1e9e367959e754c17d248a"}], 0x248}}, {{0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000001e40)="ab1ec1671f4e66fd0dc1053815b5f57cf5e691997f1edfe237b1ff1d813c498888f164571e7124a73f21f645602aca327800c58b943c731b15025efe8c76205719a145ffc395fe9f479fe2c7aa526e5316e23fbc330f5140c2b8b1f3c081395eb928ac468644f72c8f5d638474", 0x6d}, {&(0x7f0000001ec0)="005ff94a06935f581ec057e5f26ea9d3a766dc8257879714e211433dcb316b38c5ba214832", 0x25}, {&(0x7f0000001f00)}, {&(0x7f0000001f40)="4462c6d2c9a5ea0d6f711d7d5c6a8484f29a07083cdb3590bb14d4f6c418c4120c4de1c94e666b4e06fea21b42c85e7e08efbc51eb927e3239e056b27e83ebb95f914d231dfe99da349ab5aba50895df4f514af4b8b1174c3d962e18fcbb4dad917ffa80003c435c527139fa97fec67c735b77570ef2a89759839a88b8fe3a8f59ea7fe3ec3ad6a3cd3dae06d936be5499851dcdc680a63d758e92a60fae22f373e72acb6f", 0xa5}, {&(0x7f0000002000)="4662f9a89e1763f1f02093c9c1a5e5fafc613fe8274216fc74b176f6c6d388f5fc4ac11a309eff77ef3f5039fdaada62c62a630845dbab3750752c0625237329eb486adc925694779cffe4738383e0bb5386a9a387f20f73450181ea20ef11e34406ab89f36ea3f0813e5115b45c88bfdf63b1a9d25c76547f1905cf055ac4eb8186394b99213b4bc4163b95982556c334f01909325646a7db2b29b59cbf198a0f928adf7c4d769b4d29913505fee56b077929b97ee4c9dc73ff68e96ac14c139c2b32dbbbf3f4973c77a74007819332d6", 0xd1}, {&(0x7f0000002100)="e7514c3e80c13389ae317186e35605b572ecfc9edd247c4873ca2b3e5abd0bff58cb60af45499cbb9f6dd0d306c0e3734cb6f2a78d6506496aa57b30b89b2376cc29cd89704e3e0175df674d194bc73cf6e9474e122aa6f2ebad6422751b2aa352e29e1cf92b89d8c1ef0f3181384f0a4767d1f1977a405f7f26e9ffbd28bc85f195b49204131f3b8d25c8e07fe88449ea27d5d71d9870d400022ecd165357ec4bac2097b10378afcfdd08cf45245bdd39", 0xb1}, {&(0x7f00000021c0)="c8e27a2ad065540ff215e591695978213e33bf0e3dff01d91abc882dec449a84730d97627a57e062bcbb00733a95f3bafe13fb5bdbef0c54dc25f686240269bb767b07a4c59f5108287121f6f4800601e51d41f6a772cf9a30789d377a45d0542e3c131e1c2c64aa66390983395ea55c2f2b4899460ca560d90f69b107eeaaaf008f3d556db7ba0d6a35d9df2e9a64832687e60686ae02cda1f295bb7593a541e4e8a64cf31d76c0d0b4d3803a3078a139910e932dc250325f232204da103638a217f85859682c84c013df5eb9695a45d8c245af6155f73062b6d05b9c5487a5b397dde0e0721fc441bed1ac8b01244a89948f37a889f82b17d8", 0xfa}, {&(0x7f00000022c0)="4b2310d7013d765aa93fcffaa82ca1b9e567106ff5e9a04e448e40575cf178e8fdd1152122a643921dba545fc45f0f1ffcb7e086f4f8b7518b3a25686844f4e2dd8574f94f29b0b863aeebb88ecfc9e29a56e9d47c4b0cff898ad38e61bcbb1830cccb1720b2d91cfd36038b4982cf8ec1ecab8058f1b0de35b7733cf01986d1aff9f386c1604d982c78", 0x8a}, {&(0x7f0000002380)="c9e896", 0x3}], 0x9, &(0x7f0000002480)=[{0xb0, 0x113, 0x5, "1194d32331a1fbcec8ed881ae0d84f97a37c0dc1d126031772557e64a35a17d669466c37ce56c5b5da815e5900aaf06b237acf3abf7b813ed298bd293c3344a3872c15ab11e7aadf0bb054dc86b0cb862d9c846addf7f4f19952c047bf390f08fbc795d34f377530877be50dac6d47427bc06a29671c3c60d9ff6569dbc10849b373088ad7ff8ab05468c637444c6813e2e20d9d90d529405d33695afd"}, {0xd8, 0x103, 0x101, "f9b980585178c05490a00375377871fff98ec133f40f146c08f9a3941fcc4fa71b7154987ce874f3251590510afed72fefd81dd751c013766e14284660b917ba6c07be97742f3d63531bc469f707811d3b3ca48155d2d089edea008c4199b50d3e4667c2f3c75a930515da2417be3cc56f6057b41151eccf1ec2dd16ff6216368e82e20f09942059a2a41293fe810d4f218e03b9daba5a1c2a697ae9c00bbf9440507837a6691e83b5c6792f376f90e6915e57a928a26041a32f2aabc2df9a3e8c70370890ede388"}], 0x188}}, {{&(0x7f0000002640)=@llc={0x1a, 0x7, 0xc2, 0x1, 0x9, 0x7f, @dev={[], 0x3c}}, 0x80, &(0x7f0000003780)=[{&(0x7f00000026c0)="bebd67a603386f7f379443436d06213ea6881f3ef90f90994b5c3f5d6a082f7182b2ac7029e649dfdbc3134c38b5e859a3ce902d9c3cb525ee61b40415b5eff5600094f0d8d9ecdc22e6a6722ca41ac10d937236162023966acc08cc54b1ce0cf742e300dc74314531a13962463132d69fea903ae3a29a6c8741e961bde5c20dc7d13a51558315ac35e1a53c377115e16d965b405bd4bc5ddfaf88965754c714c339564cfaada62b529d0519c0e15ae74e06af93dd", 0xb5}, {&(0x7f0000002780)="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", 0x1000}], 0x2, &(0x7f00000037c0)=[{0x50, 0x108, 0x1ff, "f11842c5e72fb7d3ac3fd4690aa6397003e993a1d441def60a4e6ce2e7584ee191abba54c4936842d821451254eafa10711069ed8eae4533de9c46b758"}, {0x38, 0x10f, 0x3ff, "7f5900e5dcb5f570d6dbe2f5f86f446970faf0599cb89daf78dc80ead4e99d5573f8"}, {0x100, 0x10b, 0x7fffffff, "f838dfc06f6cadce246785738b79eeb2a07e19ba0555fbdd7e19314f8cb93370bed274a3a8439847c293b97f08903dfde169264402e0732b51d91b3cedde255ee8c530ff9bf1845302753989cbf519c952dc7d7ccc2763a7aa60802d14d0f696b1cdc960050e627b966d62f95f2e6f52cf4743991246385e33b8ce01911393f2761d99534ae389a28be7656a5ca5e801ae662203fa7508affe4bae61d2cc0b878ceb8a2e7baa977e0400661f2d65099310df73fcd5ad8b13544e6825888754b9ba9d103d03683ade3462ffe1a9033c2b07c303c2a6c1e3d44abf99cd7880b99fb9122d140b04e88f86b737b3628a857d"}, {0x108, 0x10c, 0x5, "c8c303ef7be1492a86599ac4fddc78025ef4419aa8a9c928e6764078125bc645bf7baf43ecb9dfa216eb9fc04f9cb95d4902e55c199378060e41d778c88fb5aafa137d94fdbd00e9c479d03a5ce57d54c8028413acd59c413426b11596f891bf5d2f831ec60a0529e5e9be9faf602622c2e4b4a8ce2e7ccfd0170bb2ac55c212c23550f99f9f6b043fdf217836ece8e7e23176fef7c4e054c69c3e893c37a92e76b31730e0952a3b2007b4357b5241bd41ca46f2a9116aabfef1d55d0e495230f0650ca21b30e6bc92370bf908a6bb4119753b3903a6078bbbf9524b4ae82d9b7d536a63261803ce11d9ee8b4c21c563025fb5a737"}, {0x1000, 0x84, 0xb0c, "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"}, {0x78, 0x1d5, 0x7fffffff, "9f5e9e01e2488c7b420e6e3e66d84db7a0deeb9efc62812b951c9464d35766068ec131a0b4b191f8bd3570a76a747f29c9a408b5d7980892091f2b5547d191d710ad1ded2c71fee8eab1a7f4bd4a25781e280a77feeeeadd41dedc2a693d83f2d66ef10ab906c220"}, {0x50, 0x115, 0xff, "09593a0c2a368a669c71b38befa6dc511c3d7132a4fce624cb117c238ae46cb63050e6b5bce5b5b6a55924408de65f373a87f4c45d092acc3273673120a38b72"}], 0x1358}}, {{0x0, 0x0, &(0x7f0000005c80)=[{&(0x7f0000004b40)="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", 0x1000}, {&(0x7f0000005b40)="467fe907c153f9f544bc61136f45c10222dee91c774e45f1a18bbd7bd0f93208fa6dc74c481463565f576c29165df84bf83afffd2b2d9ac9491f1232fcd939719ec5f5b798d69bf0b5f3b9772b57b5238e76da5775f85baf91d28d71fad52cf0eade74d0451dd628e4bb", 0x6a}, {&(0x7f0000005bc0)="c1efad9b43d656a5e406f2bbfb3df6c33b8d0829a1cd942f9951bb0429a662082104522dea2491a446a6e2c126a2aa29ca62b4cfefae01bb5574d94c144acf6976bdf7006db72326d6d34b39968c469083450f1bb042809a0a3cfc6b11793a0c43ae21aadebb06540b4df547a2b24e36e85299d239d66124da842d5de9988d995cf3fa36aabe35", 0x87}], 0x3, &(0x7f0000005cc0)=[{0xd0, 0x3a, 0x800, "3c9344bda5b32d23b95b91a24c49d58e758496ead56631267f20e1bc96d644d66939619eea2b5832f2fa2c64edbab3391537d1ad39aaf53126286b6de7cbb43c68225742ad1f3c652d7fe0df5b917b282f21e6f5ae1cf26f7c3ccdfbb45dabf69fb6088a2817385bce0411a5620547a84e113c2b3548d2b7bbe5945fd74c0f1322f815998a0a2ab37d7ea0580ef272e91cfa5b531cea4a7d7b88e6b98c0523a82e1a759c5cfcd3e58b3a0a5dc2a32b80928edf1e6e74fbc8f1ce3555fdc2e96e"}, {0x100, 0x102, 0x3, "14f7b6ad16c11c8a3699977c58c2539cd1ed03a600c40b76f63b6471c9ca46e44bce92273c3495c8a294971f015dd1d8be076f41cb3743a75bde74b12b64c2d6b785896121e111b68bb55aee45778c266fb78a7783f2691576c80ee607d4b92d08ec123fa4e95bd112f24c5e921906bf27297fe7a110fcbd30ebc202505fc8f206c03894029959d5cc4a75b0327c372a814a26db7a82ea821bdc396b7d05dfc2fdd01e9347c76deefcf92bb4d5b42cc8361a9fcfcd93f06274938a8cb4fccd18dddf57114c0c3f5092dfe2aa1c5cb057b812f7d3e82a81f2964c090fa4c1a9d33d0a4702e07b1d2775"}], 0x1d0}}, {{0x0, 0x0, &(0x7f0000006f80)=[{&(0x7f0000005ec0)="6066fa48a117fbc6b065080229c19a50b3bde3f14198401421c1cbce7fc29966d6771d20587babf0b6dbf29dc122baca74a1231aedca9269511cd9fc8b1374f41046009d82d53df0eb3c7ce1ab6ad0c74796b608ddf9ef5e197ba7180b3e72f5451cc6a039a3a27b1cf387206b677f84cfd4916268328a4674636b10b099560aa180a1bf4c15060e35553f5036f71fb262b2215f29a6d7479376628650f9d7562937a73b6c543f2c9e9372fda3d4ebd7c9cdcd94fb6aef07816df0426b92fd26c07e94a7636ab101cf8ce62584e6c7af582d24d45309e3cbc110ae3e7fbedb243985c5aa0b4eb52f979240fe1f0f49dc913613a372fc174c68e84569fc7f21fd77cff268f3f97f3126b19d3c678a5949f006c9009049660d02db9a51d5e17d7fe41295300054ba3829ba4bd5f8334017062e860f934197a54c0af7dce73e9e42b12e2e293e95f8acdeee78d5cf709eaefe6e09a3c80267cccf09abf1dd735b9efc9d9378f24c35aa362cff2bbaaed95c0a3dd374b7fbc02cb2b58b04782ebb1c55bdd737632c3e013cb0c7dcd97be03a567013c8fb80aaceb1caec5f5194c8f8706a22632b61e97ea272ea13b2b5bcae0daec0085c4d66f6b853ed60431a61124781574417edd3057d497bd74a3f4b2b2eac90d34b4dc58213c2d945b79dec86d782ac0c766305a1fcadd2b08edf86cd2bf9be5aada4a78bfbe108f1319b47745ddc5cef1df5e69a684422b0e7025ee3fb47ee86b0bb666d2d1fdd52121cb621800aa698ce243ac98196662706d1ae955dc36aa77d0d940acb099df6f155e397cf19265af7bec38a3c99140681a9e77180bc76310ab9b32021031ca760144fff15f9b7aabbc4c91831d80cd4b277c40f5ce08fd5103260576b02fb7eee5314afd3275e2bef62eb7607a4534c2732f830be79d8c502f595901d16ac52ef4d6ff080560d959e3970950b2dab98c9215b108e2673ff5c1abf03fa498af65224ab02cbd44ff9abffc882e93f7359c7c29e31e7d8e3bf77a1344868e9592b70a049edacd06cdce8515bfbd852120f3cd74f4f39f8e2d6b24dab99175e3422aa6636b004d2352aaeedd1451f6ddfabc61d7311412b7058590dfd680759878d42e4281e6190ef51f161bc35fa14456138d9cb0f4ea4dff9a2b2effcd92fd4e6e5e1f6e81b236e75f5323c2b9d0b07bc053b3175cde3bc98560f0a2b7281021085a2a65f407325692a8aead9d1bf408331b95e4005defa47f421d1ccf3cc29e2b52ff6a821f2109029cb6a8a11b7d7f3b22e6b1bde5937f16c86083881fe813b8bc575aa5eeda3165afba2747e96eb7cc38efb6d5f89f9d6980505409fb61e880c24c057ae229f654b92c5f62ff97545a42b80b53f9e4807f56c2b7b377444ec8783dff3eebe1046ecb5a271f930c532a650da9f5dc098685d931f0cc5c5b164a304cfc0ba5b5b0d379bcc4d0c0272e6d86615435fc5da927715e489990dce22c5272fba92987087462d127ab18330d1cd8d1057cbf2643a9eb6e4cff8d359fcff2560a391fbb0555da753ebaaabe063c56cae21e2da7d1c1a9dbd380ca5fd39584daf8f512ad2da8e3da9736f9532e912e385a2a62ef9d52491f818f9af1252a0e7dbde4bab77c86b2eea53625af32fb464c5546c8c9a8e9dbed63593afadc94896c53b3404b42faf2f1145d1950402e47336f667d41eadcf0d1bc4789b3d4c91128e10671633b59b621e3718ab8ad1ffd0341c383df7af98ace930f82b786399b9da54dd9dc9386ae0e3321f8ac16b1e80b39d6dc684123b8246c087a683b58016415af66b5637a1cd292a39705d7a86fe155ee72e5bb828f79fc69797f8c40a8368e018aebf86914098cec90c6696e4645816927558e7297a757a630bafa171177bbd2737cf4d8cfab2bc210ae396d44f759a9b74d163a208416a4adece8bcafc1cb3f317052c0aebe3dca6eb51c356cb5ef1bac1822be78ba5b1ccf62375ce3b01e7339580ea36e0c7f22c3e114a2c6bf72a832aa5197b5b2bc4833740d911aa4ce177db0190c0dae973419b6cb3057a0b931ef19d0a3eba5a83c7d3a58aa58ad277698d3e4837bae6ec83b81f6f06f05394ef615d28d66d2e1103428e4000f679550f49ce217b0236fbe8d01e2a9204d5b9ae148f36bf73196431a1c54c30942b118a10ddde0ddef6c457722246447c84a1e4f041ef3da70ec8e158f96a9f4656c3818694a74aededcfbf0cdc9def8a38a87e61b6b4f3bcbbcf430df9ed19c35746d5a3bc459dcceb6eaa293e56f24cb6d87ec09f2ce0ab067781d36f869aa40f2ff6f78109ff6f554d6cbcc4a6f1df407b78ceaa7d41ee757ce9740d17ea8585f08a2a49c859fa065735fdc7f003df93ccd997d01fa11aafbfc6853b10708d0e8925338002c1ce47d66f649b0645bfcb2ebbf5f71c2d7e12f6193ed4c400b5095cbdf1cb2c48e82dca19f9bdb86d2a2d78a5636262d92fd2df9c950bbf57e1ce9e3f662ac957c1c0916cf67142a4c54ae6e1a9d76bdf5138caaa969967c0583f0abe62433f65d0b8ebf936a4aabf678a92e6a8bdaceb29a26e6095bfb459d28cebb718a5dd515bde26746b29f83bd3638f0178362c54341ee6fa37707557cade154648992095d6efdb5a0478176ecc61c50d59b6f8c7e38d72142edfbe6c34a6ad43d4f841fa0ad640e8df4ef585b002f75e52afaa009e35ede56581ce295ac0582a38553bbdd9bd3e89500af27b439c1866e3127343ce746a62e49e39077e9cbb04a9e55c1953d7d1c9a91b0f5fe527aafdf797220a023991b43eef65026273bf46c1210208115bb8e16a022a905ea6c31e401db3b8ed9af9c03c6f8bf46f12600e264e9942a022ff1dade0372b4e0b52c9e57fa524828544c8accf82ecf0a6c2c2e3399846c9c57965164a9ee1cbeb5efb5b6c82fac0547fbf9fc0493591def32024f1f466d21625277f04c5a5ac667c4d15407c4a7f6de16802ac29efb42973d8cf9ab22e8a2f07b61862027a2c838d2ad57e5893ae3a207c2050a8ac99deecd5ea38c4d6bea8e5e53774243af0d58b9d85c335e908d2b899e249ee3cdc73847df2f9fa97ee6df5f9c102705962033eb9e0ec48f879a9004b823d23b6d38a72bc2228b0402e3d1f94a13a9185be561a7ca4d6c60820cb59a5392fb6b36f151da17f0196926050a64e78e5e14542ddec8df03e63f07d8d452dee82edb0154f30ee680976adbf44cff7882c726a873cecf8df45efb4f25fe88559bd51c43ad7318649e740746b58f5a863b21542b81f62b7b900671658bfdfb839db4a53eb28a950c788b46b288b6d797c572e74620a84578287ca2439b2b2bb323f5ba7734ba6e277df973d0b11d9d8da4550ef399b0b1caf3b7a046755da9d5080225bba3642ef6e15e3294b9a345721ca1010362cc595929723ed782c087aa4eccdf6c7db8da342621590c72f4623c2db85c1a06b75fdb41e4d2eb6d4672d6a37593b387849865301811ee7540405c39aabf0189897cc721aef94cda0524d7360a6c62c6b9aef74e6d0d0df61b438f32fb567b666736f51290234c74d350bcf470f3c059b0824e32cfb3dadbb169538e1fd304d2eb51401db4c452229a7b495c233f106434095dd3c5f438bc42991a1681d36ebe4d5291d6cf243aefd0d3497c9b477b6786623d8bb08787211a04abb646ba9faaf47ea6d7b40a205224ba9e8074c9d86c319aaa51cca6b4638d05f9c696aaab2c5148b621d041ac34fd985a75d314196fb5def56488143cae1baf0e7ee62ed4718329d5bf00fa47dcb59d3176a00a1ee2a4cea8687fef6039e54887e6a917a5d4429a3e4bead95fda99749d0ecca39eb13434497664dd85ebd8b808f6db185bfc5a21f04ac94305908d125566c4645cf046d820437f0ad3cb2868ac2979a979cb7081fb3a9cfd9a297fa9682e16b91db3be465694bc1f0a1bc47f70d3fa1713f4354e9102b2575e6ae0699d35b97d0babfead73cb11b7b8242bd48ef2747f14821bfe46ba3447f0fe56962c1581c8c4b0986542ab3fe5294544b8519780ef755a30557613bac8505b73f8fcca81581f82b9daff3e329ffe7d519d4d65b71d3d972bcf8ef95d0bcca2ebd291ded2ea482e34c5d72a3917073b9f73d37bca0ea61f9b217efbd5eda02a999f4cc32424d16f068fa26105c372feb44d52b45de62ac7281cf7151ab37a8b55a86c7da1105c50426a0837bfcb8a6d681728e20dc03d5f730f380126bb42e385adb00b1c86cbc01b41035e8d5e0ca8d5ff2f0667c7c71949a001a282468da452d2b778f8e6273295b4b82c8399609e9bbbd7107a30cfd50389983b77a77c508e9b12f667bd9e989caa8ea92490dc9ebb3c9337f4caf69528b5df12c45e91cd59031a896ed735de21134cb3c7424e1c31d5d9176bfd3f2be78d77e2ce7c6a0ca5f1acd28b413925dc7e9845d785a411c4d7770cad962b0ae3f9f8b40294b298e89ae96094c78161a089a344fd95c81f4bf5e923a231989570c69ca65e73f6d80ed8f07ec345662c71d8bd3f835d1eba3f4555937db3dfc5ddbd67566b362597b942cdd77e36526c51d27eb3bbcf1707915f6f03285c4cbda8f89bd8795c007805c29cfc06173fe32e6863c01553595e82842ca629f0f84ef9f1001448d52ab2461775df0086aa7bd7e2187181e28072fceac95080aeba69ccd3f0a2f5d3740a1328baa3b418f1f4195d000d190d8345088781ee1ec3a9f8ba9cf547ec2a2159b11093679c41bb4d6d58f95e2da829ca25f52c8432d892b6602c4dd9a1616bbdc5aa03ffd089a0ed724e1233f1c8983e7c26d5a6e99f457e746d814a9d35f0847b521d3089b93229b857b50a7bcac8ee6d778d6defb949ad6ff733e79cee841eb5781b6aec76f220fab371cc8b77b94b806070715e389f9681f7fc6807e3b892a33c1fd6eb9d4689a0ccfba9f669a3772506a884f4bbdd7e3be0dbdbcf887202ea233e41ed607a71737022c4ff70879ffbd93e56faac26cb14ad6439bdb58df2fddf5740cb0b500ede9c5215d7cbd3deffa8cbd3c53b4dd288cef733250c7de61b59586a70ecff0cd3c50ba06e7030dc113c1ac873f17864f3515e26b85be108f2b892ae64da93b539cdeb8295f8d30758e026fb2f636af4ed7efb7ba4bb5c7c9cdd6e256a6a0b386b1858c17311f007799cca8e30905ea4770a8999db7e2926d98f1d4d548837e228f316a5db69c4bbc11e9a11fb704e6adf977a89590d8811e17800ec3525877ab0acab0b29dafac5f48e9f77682ba2e9be72a63048e5746f4d3d32fbc2976e7c151a3dc3fdabf57d6a2a48bd6d16982a8399710e3ea8f28c121e674d4c862d7df7df25c9619797ce08d356d08385f5eb4800267138f6488678ec48019c60c8a8a3c1dcf786cc7fbd384362c504aad12dbc45f2cd4bfd638d21cd704a1a17a79fb50782b2f24c140f458a5c70c6bdaa97f56fad850c7ef836aeae3810dfa3e4a6dd6711637a01ba639d1f5ecc9f6d298da649d22467c0ab191edebf2771d9df32e705e08d6e252e4967663dfec424d3c81c6bbb4ea4e71c033034408ea7229477f1770792976eb321ae5b7d2c110e70f27f2e4af2d00cb385cc54762653a6bdbbc3d8e5982182d7be171e0c33c4d7dbe7a6fe864c7c9598b070088e600109091537d0b69808e113f08612e41c9b1815d2d9a654cb09ee3060df875ac266af3040724893ecc8f7976003af7c570696238d653bb6c2b7f5a64d36143e335775a6f0aeb9dca1f8f231d8e6e95da63a3c074aa09039d4db4f5f22f9582a5e624b2471fab", 0x1000}, {&(0x7f0000006ec0)="6ef648883da4274f5e785d38080d3423b744efe3273cc49e1313f1e1828249cf5941ee41fdd0522cd067ef9444190cf290804b842e46029c7ef6bf82a085fa9f03baf9ab1daa27462cfbc6801de391599ec0b4992bfd0aeebc321a79d181c29cee5c33d4f4afcb4701f9797c95f9dbfee7867b5da4109d1f6a4b3bab05ab0e0fba3041c65e35f9589ceabab2abf548a437e0", 0x92}], 0x2, &(0x7f0000006fc0)=[{0x110, 0x110, 0x0, "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"}], 0x110}}, {{&(0x7f0000007100)=@generic={0x28, "b71981ca2cb4e64e07a7fcd369dc93dd1a4d7bef72743f1e0c943b648fccf714715b5696d10e32c3ce8546645f59ffcfd0060ddf8bd94e38fd20f2096e44850894885b7d2b05ca37636633ba35a359caf780f973629ece306bb6de7920a467048537b81c2b9a96e15b1319c5098047c36a54ae7f0af587f1629897f36235"}, 0x80, &(0x7f0000007500)=[{&(0x7f0000007180)="ab96978f23a8000685c0fcc9", 0xc}, {&(0x7f00000071c0)="7db310ae0925fc52711712e0e18ddaad05fa2f4f60466eacbbe8526041baff91b07d02e05fc9b0bec5cbbaaa71a9411ddefe232d6ccafa09c2dc4803921c89b94735f4bd792bca7ab3c4ee0aa28d2d75e0aa69fa9ec1fc6412ee93562d588bb184c62543c7f4451317dfd9d997d9", 0x6e}, {&(0x7f0000007240)="360da20d69ebabb5a16ab786fdacd292", 0x10}, {&(0x7f0000007280)="50d4aa3a7bf183352494d793c910e94e7227a587f2df752dec6160ac075c41df1eedf4104ba59959b19bb98ab8b9d5d47d8618f469ab5ea5ae620999f85b7a2b9bb100348c0763a0935fc5ce83f4890abf3150ea8fd9af242eb43329241720ee9ce3cbfa2b105e9de472140c522d4c2ac42c02fa26183c1d4cecc4602dadaf04a16a4f62aec3de7a63b9624dc5b202b30881fb1444d3b565e4bb185c7353e172c76d523b418f09abd791615a12663964ca81606928357d339a22df9af80963c77a08fe1f86db708dff918f502c2a1f8a96ae0d73f7ba42d923dae91fa292befb73594e5034cd4a2aa277e95d3566", 0xee}, {&(0x7f0000007380)="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", 0xfd}, {&(0x7f0000007480)="e1060939872d8ce4a20899db3847f249adfbf69fe44672cfe4755d07f636ebea52320b7c00f92890b607a99537c477494256fa35473d0ace281fc0e84cb15bdcc8f1", 0x42}], 0x6, &(0x7f0000007580)=[{0x60, 0x110, 0x5, "27b14b719618d78e2083633b08c26b7b0aea205730cccdc99ccc380edeb013603523ddd5ef8b2b078b55417651a745dbf0cf53b76bc44c9209984c17e601d64440a77bb4b6f8e41af9263e30"}], 0x60}}], 0x8, 0x40) [ 1632.809213][T31145] EXT4-fs (sda1): Invalid want_extra_isize 45 06:56:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x5) ioprio_set$pid(0x0, 0x0, 0x0) [ 1632.890596][T31161] EXT4-fs (sda1): Invalid want_extra_isize 17 06:56:38 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0xd}}]}) 06:56:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r6, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x1f, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x11, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r6}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000019c0)={@private0={0xfc, 0x0, [], 0x1}, 0x24, r6}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='load ecryWtfs ur:user: 00000000000000065 \x00\x00\x00\x00\x00\x00'], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r7 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r7, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r7, &(0x7f0000000240)={&(0x7f0000001a00)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}]}, 0x0) recvmmsg(r2, &(0x7f0000008240)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000003c0)=""/145}, {&(0x7f0000000080)=""/103}, {&(0x7f0000000480)=""/160}, {&(0x7f0000000540)=""/173}, {&(0x7f0000000600)=""/99}, {&(0x7f00000006c0)=""/128}, {&(0x7f0000000740)=""/109}, {&(0x7f00000007c0)=""/244}, {&(0x7f00000008c0)=""/146}, {&(0x7f0000000980)=""/142}], 0x0, &(0x7f0000000000)=""/14}, 0x800}, {{&(0x7f0000000b00)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000280)=""/29}, {&(0x7f0000000300)}, {&(0x7f0000000b80)=""/225}]}, 0xff}, {{&(0x7f0000000cc0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast2}}, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000d40)=""/213}, {&(0x7f0000000e40)=""/42}, {&(0x7f0000000e80)=""/82}, {&(0x7f0000000f00)=""/11}, {&(0x7f0000000f40)=""/253}, {&(0x7f0000001040)=""/62}, {&(0x7f0000001a80)=""/4096}, {&(0x7f0000002a80)=""/4096}, {&(0x7f0000001080)=""/41}, {&(0x7f0000003a80)=""/4096}]}, 0x3f}, {{&(0x7f0000001180)=@generic, 0x0, &(0x7f0000001300)=[{&(0x7f0000001200)=""/169}, {&(0x7f0000001440)=""/164}, {&(0x7f00000012c0)=""/11}, {&(0x7f0000001500)=""/141}], 0x0, &(0x7f00000015c0)=""/87}, 0x2cce}, {{0x0, 0x0, &(0x7f0000005a80)=[{&(0x7f0000004a80)=""/4096}, {&(0x7f0000001640)=""/197}, {&(0x7f0000001740)=""/96}, {&(0x7f00000017c0)=""/41}, {&(0x7f0000001800)=""/180}, {&(0x7f00000018c0)=""/189}], 0x0, &(0x7f0000005b00)=""/82}, 0x4}, {{0x0, 0x0, &(0x7f0000008140)=[{&(0x7f0000005b80)=""/62}, {&(0x7f0000005bc0)=""/184}, {&(0x7f0000005c80)=""/164}, {&(0x7f0000005d40)=""/4096}, {&(0x7f0000006d40)=""/205}, {&(0x7f0000006e40)=""/144}, {&(0x7f0000006f00)=""/4096}, {&(0x7f0000007f00)=""/18}, {&(0x7f0000007f40)=""/206}, {&(0x7f0000008040)=""/210}], 0x0, &(0x7f0000008200)}, 0x3}], 0x0, 0x1, &(0x7f0000001980)) 06:56:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:38 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x3b}}]}) 06:56:38 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) [ 1633.006452][T31174] EXT4-fs (sda1): Invalid want_extra_isize 45 06:56:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x6) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioprio_get$pid(0x3, 0x0) [ 1633.070269][T31189] encrypted_key: master key parameter 'ecryWtfs' is invalid 06:56:38 executing program 1: creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1633.134434][T31191] EXT4-fs (sda1): Invalid want_extra_isize 13 06:56:38 executing program 1: creat(0x0, 0x0) 06:56:38 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2d}}]}) 06:56:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioprio_get$pid(0x3, 0x0) 06:56:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x7) ioprio_set$pid(0x0, 0x0, 0x0) [ 1633.237620][T31203] EXT4-fs (sda1): Invalid want_extra_isize 59 [ 1633.253240][T31176] encrypted_key: master key parameter 'ecryWtfs' is invalid 06:56:38 executing program 1: creat(0x0, 0x0) [ 1633.368156][T31210] EXT4-fs (sda1): Invalid want_extra_isize 59 06:56:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x8) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0xe, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x1ff}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2}, @generic={0x7, 0xb, 0xb, 0x7, 0x10000}, @jmp={0x5, 0x1, 0xe, 0x1, 0xb, 0xffffffffffffffe0, 0x8}, @ldst={0x1, 0x1, 0x0, 0xa, 0x2, 0xfffffffffffffff4, 0x10}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @generic={0x1, 0x2, 0x2, 0x4f5, 0x40}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x3, [], 0x0, 0x5, r1, 0x8, &(0x7f00000000c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0x8, 0x101}, 0x10, 0xffffffffffffffff}, 0x78) 06:56:38 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x48}}]}) 06:56:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioprio_get$pid(0x3, 0x0) 06:56:38 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x9}}]}) 06:56:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x9) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:38 executing program 1: creat(0x0, 0x0) [ 1633.580248][T31255] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0xa) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:39 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r0, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r0, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000040)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1633.628936][T31259] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x0, 0x0) [ 1633.693715][ T7287] EXT4-fs error: 277 callbacks suppressed [ 1633.693729][ T7287] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15813: comm syz-executor.2: bad extra_isize 18 (inode size 256) [ 1633.708482][T31259] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15950: comm syz-executor.3: bad extra_isize 18 (inode size 256) [ 1633.740788][T31277] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #16002: comm syz-executor.3: bad extra_isize 18 (inode size 256) [ 1633.762858][T31263] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #16008: comm syz-executor.5: bad extra_isize 18 (inode size 256) [ 1633.770470][T31267] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #16003: comm syz-executor.4: bad extra_isize 18 (inode size 256) 06:56:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x10000, 0x41) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000280)={0x8, 0x20, 0xffffffff}) sendfile(r0, r1, 0x0, 0xb148) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"/1058], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="b9ff03006044238cb89e14f008061bffffff00074000632f77fbac141431e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a39010508038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000004}, 0x2c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1633.778002][ T7030] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15848: comm syz-executor.0: bad extra_isize 18 (inode size 256) 06:56:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) r4 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond0\x00'}) r5 = accept(0xffffffffffffffff, &(0x7f0000001700)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000001780)=0x80) r6 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000001800)='NLBL_CALIPSO\x00') sendmsg$NLBL_CALIPSO_C_LIST(r5, &(0x7f00000018c0)={&(0x7f00000017c0), 0xc, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, r6, 0x400, 0x70bd2b, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000000d00)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002500)={&(0x7f00000024c0)=ANY=[@ANYBLOB="19000000", @ANYRES16=r6, @ANYBLOB="000826bd7000fddbdf2502000000080002000200000008000200020000000800020002000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x4048000) sendmsg$NLBL_CALIPSO_C_LIST(r4, &(0x7f0000000780)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xbb4289e2ace48c41}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, r6, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000050) sendmsg$NLBL_CALIPSO_C_REMOVE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r6, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x3}, @NLBL_CALIPSO_A_MTYPE={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000080}, 0x4044000) sendmsg$NLBL_CALIPSO_C_LISTALL(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r6, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20004000) r7 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1633.840595][ T7160] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15945: comm syz-executor.1: bad extra_isize 18 (inode size 256) [ 1633.847137][ T7287] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #16022: comm syz-executor.2: bad extra_isize 18 (inode size 256) [ 1633.872986][T31259] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15950: comm syz-executor.3: bad extra_isize 18 (inode size 256) 06:56:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0xb) ioprio_set$pid(0x0, 0x0, 0x0) [ 1633.888121][T31263] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #16008: comm syz-executor.5: bad extra_isize 18 (inode size 256) [ 1633.959153][T31289] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'netdevsim0\x00', 0x8001}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r3) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r4}) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r3) r6 = add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000280)="084a50975a6507be287193a21822772b2a4554ae7cde1b6cc0a90fccfec89a70c5031eaa88487e19594957d6f7a0c85b6cbf98889ce21066fbf68872a30c00f832bca91d72dbb2d2c0a2cb9141224ab2c42d7d6ed5b6791ea5e8c68bed8b97e4ee7e42ef4b19abf3535a8fbe4bb1a7d1cd0dad307dbfb4f23637f185fb39a4e711f22870b33010f1a2af97f8ecf661000e134b3cb0", 0x95, r5) keyctl$reject(0x13, r4, 0xffffffff80000000, 0x9c6e, r6) keyctl$instantiate(0xc, r5, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1634.047158][T31297] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:39 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4c}}]}) 06:56:39 executing program 1 (fault-call:0 fault-nth:0): creat(&(0x7f00000000c0)='./file0\x00', 0x0) 06:56:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0xc) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x0, 0x0) [ 1634.150995][T31312] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1634.163878][T31314] FAULT_INJECTION: forcing a failure. [ 1634.163878][T31314] name failslab, interval 1, probability 0, space 0, times 0 06:56:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0xd) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:39 executing program 0 (fault-call:7 fault-nth:0): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1634.196157][T31318] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1634.236768][T31314] CPU: 1 PID: 31314 Comm: syz-executor.1 Not tainted 5.7.0-rc3-syzkaller #0 [ 1634.245468][T31314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1634.255520][T31314] Call Trace: [ 1634.258813][T31314] dump_stack+0x1e9/0x30e [ 1634.263149][T31314] should_fail+0x433/0x5b0 [ 1634.267571][T31314] ? getname_flags+0xb8/0x610 [ 1634.272244][T31314] should_failslab+0x5/0x20 [ 1634.276744][T31314] kmem_cache_alloc+0x53/0x2d0 [ 1634.281510][T31314] getname_flags+0xb8/0x610 [ 1634.286034][T31314] do_sys_openat2+0x40d/0x770 [ 1634.290890][T31314] __x64_sys_creat+0xd3/0x100 [ 1634.295573][T31314] do_syscall_64+0xf3/0x1b0 [ 1634.300081][T31314] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1634.305966][T31314] RIP: 0033:0x45c829 [ 1634.309853][T31314] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:56:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x0, 0x0) [ 1634.329449][T31314] RSP: 002b:00007f88ba07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1634.337858][T31314] RAX: ffffffffffffffda RBX: 00000000004db140 RCX: 000000000045c829 [ 1634.345835][T31314] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 1634.353813][T31314] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1634.361781][T31314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1634.369749][T31314] R13: 000000000000009a R14: 00000000004c3307 R15: 00007f88ba07f6d4 06:56:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0xe) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x110, 0xfffffffffffffffe) [ 1634.451042][T31338] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1634.468530][T31344] FAULT_INJECTION: forcing a failure. [ 1634.468530][T31344] name failslab, interval 1, probability 0, space 0, times 0 06:56:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:39 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1634.504399][T31350] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1634.533537][T31344] CPU: 1 PID: 31344 Comm: syz-executor.0 Not tainted 5.7.0-rc3-syzkaller #0 [ 1634.542222][T31344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1634.552277][T31344] Call Trace: [ 1634.555552][T31344] dump_stack+0x1e9/0x30e [ 1634.559863][T31344] should_fail+0x433/0x5b0 [ 1634.564283][T31344] ? __se_sys_add_key+0x140/0x3e0 [ 1634.569298][T31344] should_failslab+0x5/0x20 [ 1634.573786][T31344] __kmalloc_track_caller+0x72/0x320 [ 1634.579045][T31344] ? strnlen_user+0x206/0x2c0 [ 1634.583703][T31344] strndup_user+0x73/0x150 [ 1634.588227][T31344] __se_sys_add_key+0x140/0x3e0 [ 1634.593079][T31344] ? __x64_sys_add_key+0x1c/0xc0 [ 1634.598007][T31344] do_syscall_64+0xf3/0x1b0 [ 1634.602509][T31344] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1634.608426][T31344] RIP: 0033:0x45c829 [ 1634.612301][T31344] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1634.631902][T31344] RSP: 002b:00007fc70cb04c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1634.640312][T31344] RAX: ffffffffffffffda RBX: 00000000004d9240 RCX: 000000000045c829 [ 1634.648286][T31344] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000020000080 [ 1634.656254][T31344] RBP: 000000000078bf00 R08: fffffffffffffffd R09: 0000000000000000 [ 1634.664217][T31344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1634.672179][T31344] R13: 000000000000001e R14: 00000000004c2bd5 R15: 00007fc70cb056d4 06:56:40 executing program 1 (fault-call:0 fault-nth:1): creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1634.699412][T31351] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:40 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}]}) 06:56:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lotfs user:user: 00000000000000000065 \x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) clone(0x202100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0) r4 = gettid() tkill(r4, 0x33) move_pages(r4, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x82, &(0x7f0000000080)={r5}, 0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={r5, 0x5, 0x0, 0x8000, 0x5da}, &(0x7f0000000040)=0x18) 06:56:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x10) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x11) ioprio_set$pid(0x0, 0x0, 0x0) [ 1634.777729][T31363] FAULT_INJECTION: forcing a failure. [ 1634.777729][T31363] name failslab, interval 1, probability 0, space 0, times 0 [ 1634.812187][T31368] encrypted_key: keyword 'lotfs' not recognized 06:56:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)="d670970fe1b20c22a2e67c75ac89f11c44b0fd3923d8f88a3a7d6fa2ac0d2e93ba097ff1bc1de517e46017437f0edf9ae7728b1997773fd53f244513bc7f5d37c802567fa00874b3d9a9cc56caf8a5290d8b6332139b504f48d6add1de23517ced52ec709ec6195e6eb535275fe7", 0x6e, 0xfffffffffffffffe) [ 1634.850873][T31366] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1634.877737][T31368] encrypted_key: keyword 'lotfs' not recognized [ 1634.883896][T31363] CPU: 0 PID: 31363 Comm: syz-executor.1 Not tainted 5.7.0-rc3-syzkaller #0 06:56:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x82, &(0x7f0000000080)={r6}, 0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f0000000040)=r6, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_SETCRTC(r8, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000000)=[0x0], 0x1, 0x9, 0x8, 0x6, 0x5, 0x8, 0x4, {0xeb1, 0x6, 0x6, 0x1, 0x91, 0xfffe, 0x5, 0x4, 0x1f, 0xff, 0x5, 0x0, 0x100, 0x3, "355128ddbd31cb5a9ef0ff14bd33bc1cc03a0b80c400ca30e606d83c4e38b474"}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1634.892672][T31363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1634.902723][T31363] Call Trace: [ 1634.906016][T31363] dump_stack+0x1e9/0x30e [ 1634.910347][T31363] should_fail+0x433/0x5b0 [ 1634.914766][T31363] ? __alloc_file+0x26/0x390 [ 1634.919357][T31363] should_failslab+0x5/0x20 [ 1634.923858][T31363] kmem_cache_alloc+0x53/0x2d0 [ 1634.928626][T31363] __alloc_file+0x26/0x390 [ 1634.933039][T31363] ? alloc_empty_file+0x49/0x1b0 [ 1634.935333][T31385] encrypted_key: master key parameter 'ñ¼åä`Cßšçr‹—w?Õ?$E¼]7ÈV t³Ù©ÌVÊø¥) ‹c2›POHÖ­ÑÞ#Q|íRìpžÆ^nµ5'_ç' is invalid [ 1634.937997][T31363] alloc_empty_file+0xa9/0x1b0 [ 1634.938011][T31363] path_openat+0xa8/0x38b0 [ 1634.938024][T31363] ? __lock_acquire+0x116c/0x2c30 [ 1634.938059][T31363] do_filp_open+0x191/0x3a0 [ 1634.969844][T31363] ? do_raw_spin_unlock+0x134/0x8d0 [ 1634.973795][T31386] encrypted_key: master key parameter 'ñ¼åä`Cßšçr‹—w?Õ?$E¼]7ÈV t³Ù©ÌVÊø¥) ‹c2›POHÖ­ÑÞ#Q|íRìpžÆ^nµ5'_ç' is invalid [ 1634.975038][T31363] ? _raw_spin_unlock+0x24/0x40 [ 1634.975052][T31363] ? __alloc_fd+0x566/0x600 06:56:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) signalfd4(r0, &(0x7f0000000000)={[0x7]}, 0x8, 0x800) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x82, &(0x7f0000000080)={r5}, 0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000040)={r5, 0x26, "bb649d4abb1836b08ac781b975f8a5d1eefe12c648df8120d6004f7bb4dd523650dfddbda327"}, &(0x7f0000000080)=0x2e) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={r6, 0x6}, &(0x7f00000001c0)=0x8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1634.975075][T31363] do_sys_openat2+0x463/0x770 [ 1635.002309][T31363] __x64_sys_creat+0xd3/0x100 [ 1635.006992][T31363] do_syscall_64+0xf3/0x1b0 [ 1635.011494][T31363] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1635.017380][T31363] RIP: 0033:0x45c829 [ 1635.021271][T31363] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1635.040868][T31363] RSP: 002b:00007f88ba07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1635.049280][T31363] RAX: ffffffffffffffda RBX: 00000000004db140 RCX: 000000000045c829 [ 1635.057250][T31363] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 1635.065227][T31363] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1635.073199][T31363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1635.081288][T31363] R13: 000000000000009a R14: 00000000004c3307 R15: 00007f88ba07f6d4 06:56:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:40 executing program 1 (fault-call:0 fault-nth:2): creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1635.159726][T31398] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1635.174906][T31396] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1635.208482][T31415] FAULT_INJECTION: forcing a failure. [ 1635.208482][T31415] name failslab, interval 1, probability 0, space 0, times 0 [ 1635.223661][T31415] CPU: 0 PID: 31415 Comm: syz-executor.1 Not tainted 5.7.0-rc3-syzkaller #0 [ 1635.232342][T31415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1635.238698][T31406] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1635.242387][T31415] Call Trace: [ 1635.242405][T31415] dump_stack+0x1e9/0x30e 06:56:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x2, 0x922000000001, 0x106) sendmsg$sock(r2, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x20000004) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ACQUIRE(0xffffffffffffffff, 0x6430) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f8fa24679288970616420656372797074667320757365763a757365723a20301a303030303030303005303030304c766909d25c2c3ee5277282d1be0ed65c630b9ee7c41d8fb22e866f7db49aab1ca99b715a33f697561d78f1be5dd4bf448029ad7a6f5df61bafe38280f99ad2c5c5c04794e94728f51619d8a602e2413b"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1635.242420][T31415] should_fail+0x433/0x5b0 [ 1635.242435][T31415] ? __alloc_file+0x26/0x390 [ 1635.242446][T31415] should_failslab+0x5/0x20 [ 1635.242458][T31415] kmem_cache_alloc+0x53/0x2d0 [ 1635.242472][T31415] __alloc_file+0x26/0x390 [ 1635.242482][T31415] ? alloc_empty_file+0x49/0x1b0 [ 1635.242494][T31415] alloc_empty_file+0xa9/0x1b0 [ 1635.242506][T31415] path_openat+0xa8/0x38b0 [ 1635.242517][T31415] ? __lock_acquire+0x116c/0x2c30 [ 1635.242539][T31415] ? lock_acquire+0x169/0x480 [ 1635.242562][T31415] do_filp_open+0x191/0x3a0 [ 1635.242576][T31415] ? do_raw_spin_unlock+0x134/0x8d0 [ 1635.242591][T31415] ? _raw_spin_unlock+0x24/0x40 [ 1635.242601][T31415] ? __alloc_fd+0x566/0x600 [ 1635.242624][T31415] do_sys_openat2+0x463/0x770 [ 1635.285459][T31402] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1635.286223][T31415] __x64_sys_creat+0xd3/0x100 [ 1635.341752][T31415] do_syscall_64+0xf3/0x1b0 [ 1635.346269][T31415] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1635.352160][T31415] RIP: 0033:0x45c829 06:56:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x2, 0x0) [ 1635.356051][T31415] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1635.375790][T31415] RSP: 002b:00007f88ba07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1635.384204][T31415] RAX: ffffffffffffffda RBX: 00000000004db140 RCX: 000000000045c829 [ 1635.392177][T31415] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 1635.400148][T31415] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 06:56:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getegid() setgid(r1) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, &(0x7f0000000000)={0x8, @broadcast, 0x4e22, 0x3, 'wrr\x00', 0x12, 0x0, 0x4c}, 0x2c) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x40}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1635.408128][T31415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1635.416092][T31415] R13: 000000000000009a R14: 00000000004c3307 R15: 00007f88ba07f6d4 06:56:40 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x60}}]}) 06:56:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x12) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:40 executing program 1 (fault-call:0 fault-nth:3): creat(&(0x7f00000000c0)='./file0\x00', 0x0) 06:56:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) getsockname$netlink(r1, &(0x7f0000000000), &(0x7f0000000040)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x38, 0x140e, 0x200, 0x70bd26, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x2}, @RDMA_NLDEV_ATTR_RES_PDN={0x8, 0x3c, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x44890}, 0x8040) [ 1635.462942][T31420] encrypted_key: insufficient parameters specified [ 1635.514467][T31426] IPVS: set_ctl: invalid protocol: 8 255.255.255.255:20002 [ 1635.544328][T31426] encrypted_key: key description must be 16 hexadecimal characters long [ 1635.556366][T31432] FAULT_INJECTION: forcing a failure. 06:56:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x25) ioprio_set$pid(0x0, 0x0, 0x0) [ 1635.556366][T31432] name failslab, interval 1, probability 0, space 0, times 0 06:56:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f00000001c0)="f5a59544b4a26452b304caf74b04b92767b6c140048f3f344138f7441ac88f2236388df0892c5b2e583249375782b8dd5cc517c1f5fa92596edfb1146bad68986eeaf41b754eb17b40e96cdf7e595034e63849d5e72d4b0777b0e715e7e50c313c49528bfcde50131f8e6262e928c8953ae6c6ea464901ee39bfded12125bc7cb696dd526f89c92d179083", 0x8b, r2) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1635.590412][T31437] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1635.608677][T31432] CPU: 0 PID: 31432 Comm: syz-executor.1 Not tainted 5.7.0-rc3-syzkaller #0 [ 1635.617374][T31432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1635.627426][T31432] Call Trace: [ 1635.630720][T31432] dump_stack+0x1e9/0x30e [ 1635.635056][T31432] should_fail+0x433/0x5b0 [ 1635.639480][T31432] ? security_file_alloc+0x32/0x200 [ 1635.644685][T31432] should_failslab+0x5/0x20 [ 1635.649190][T31432] kmem_cache_alloc+0x53/0x2d0 [ 1635.653955][T31432] security_file_alloc+0x32/0x200 [ 1635.655822][T31440] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1635.658973][T31432] __alloc_file+0xd7/0x390 [ 1635.658989][T31432] alloc_empty_file+0xa9/0x1b0 [ 1635.659002][T31432] path_openat+0xa8/0x38b0 [ 1635.659014][T31432] ? __lock_acquire+0x116c/0x2c30 [ 1635.659040][T31432] ? lock_acquire+0x169/0x480 06:56:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x48) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xff, 0x200800) ioctl$SNDCTL_DSP_GETOSPACE(r1, 0x8010500c, &(0x7f0000000040)) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1635.690726][T31432] do_filp_open+0x191/0x3a0 [ 1635.695240][T31432] ? do_raw_spin_unlock+0x134/0x8d0 [ 1635.700440][T31432] ? _raw_spin_unlock+0x24/0x40 [ 1635.705289][T31432] ? __alloc_fd+0x566/0x600 [ 1635.709816][T31432] do_sys_openat2+0x463/0x770 [ 1635.714503][T31432] __x64_sys_creat+0xd3/0x100 [ 1635.719191][T31432] do_syscall_64+0xf3/0x1b0 [ 1635.723691][T31432] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1635.729575][T31432] RIP: 0033:0x45c829 06:56:41 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xf0, 0x301140) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r7, 0x84, 0x82, &(0x7f0000000080)={r9}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x82, &(0x7f0000000080)={r9}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={r4, 0x80000000}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1635.733457][T31432] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1635.753051][T31432] RSP: 002b:00007f88ba07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1635.761457][T31432] RAX: ffffffffffffffda RBX: 00000000004db140 RCX: 000000000045c829 [ 1635.769426][T31432] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 1635.777392][T31432] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 06:56:41 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NBD_DO_IT(r1, 0xab03) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r5}) r6 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r4) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000280)="084a50975a6507be287193a21822772b2a4554ae7cde1b6cc0a90fccfec89a70c5031eaa88487e19594957d6f7a0c85b6cbf98889ce21066fbf68872a30c00f832bca91d72dbb2d2c0a2cb9141224ab2c42d7d6ed5b6791ea5e8c68bed8b97e4ee7e42ef4b19abf3535a8fbe4bb1a7d1cd0dad307dbfb4f23637f185fb39a4e711f22870b33010f1a2af97f8ecf661000e134b3cb0", 0x95, r6) keyctl$instantiate(0xc, r6, &(0x7f0000000100)=ANY=[@ANYBLOB="6c6f616420723a757365720080000000000000303030303030303030303030363520ff00"/47], 0x1, 0xfffffffffffffffc) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 1635.785364][T31432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1635.793332][T31432] R13: 000000000000009a R14: 00000000004c3307 R15: 00007f88ba07f6d4 06:56:41 executing program 1 (fault-call:0 fault-nth:4): creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1635.883862][T31467] encrypted_key: master key parameter 'r:user' is invalid [ 1635.901225][T31471] FAULT_INJECTION: forcing a failure. [ 1635.901225][T31471] name failslab, interval 1, probability 0, space 0, times 0 [ 1635.915856][T31471] CPU: 0 PID: 31471 Comm: syz-executor.1 Not tainted 5.7.0-rc3-syzkaller #0 [ 1635.924535][T31471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1635.926810][T31477] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1635.934603][T31471] Call Trace: [ 1635.934623][T31471] dump_stack+0x1e9/0x30e [ 1635.934638][T31471] should_fail+0x433/0x5b0 [ 1635.934656][T31471] ? security_file_alloc+0x32/0x200 [ 1635.934666][T31471] should_failslab+0x5/0x20 [ 1635.934677][T31471] kmem_cache_alloc+0x53/0x2d0 [ 1635.934690][T31471] security_file_alloc+0x32/0x200 [ 1635.934708][T31471] __alloc_file+0xd7/0x390 [ 1635.978991][T31471] alloc_empty_file+0xa9/0x1b0 06:56:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x6, 0x20, 0x7, 0x9}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r4, @in={{0x2, 0x4e24, @local}}, 0x0, 0x800, 0x7, 0x1, 0x20, 0x1, 0x8}, 0x9c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1635.983766][T31471] path_openat+0xa8/0x38b0 [ 1635.988190][T31471] ? __lock_acquire+0x116c/0x2c30 [ 1635.993231][T31471] ? lock_acquire+0x169/0x480 [ 1635.997919][T31471] do_filp_open+0x191/0x3a0 [ 1636.002428][T31471] ? do_raw_spin_unlock+0x134/0x8d0 [ 1636.007633][T31471] ? _raw_spin_unlock+0x24/0x40 [ 1636.012480][T31471] ? __alloc_fd+0x566/0x600 [ 1636.016987][T31471] do_sys_openat2+0x463/0x770 [ 1636.021668][T31471] __x64_sys_creat+0xd3/0x100 [ 1636.026349][T31471] do_syscall_64+0xf3/0x1b0 [ 1636.030875][T31471] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1636.036764][T31471] RIP: 0033:0x45c829 [ 1636.040657][T31471] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1636.051291][T31486] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1636.060253][T31471] RSP: 002b:00007f88ba07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 06:56:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6c6f616420656372797074667320757365723a757365723a20303030303030303030303030303030303030363520008a155a260066613f2b129f3c1eeba4bab1218248fa"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:41 executing program 1 (fault-call:0 fault-nth:5): creat(&(0x7f00000000c0)='./file0\x00', 0x0) 06:56:41 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}]}) 06:56:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f00000001c0)="f5a59544b4a26452b304caf74b04b92767b6c140048f3f344138f7441ac88f2236388df0892c5b2e583249375782b8dd5cc517c1f5fa92596edfb1146bad68986eeaf41b754eb17b40e96cdf7e595034e63849d5e72d4b0777b0e715e7e50c313c49528bfcde50131f8e6262e928c8953ae6c6ea464901ee39bfded12125bc7cb696dd526f89c92d179083", 0x8b, r2) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x4c) ioprio_set$pid(0x0, 0x0, 0x0) [ 1636.060265][T31471] RAX: ffffffffffffffda RBX: 00000000004db140 RCX: 000000000045c829 [ 1636.060270][T31471] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 1636.060275][T31471] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1636.060281][T31471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1636.060288][T31471] R13: 000000000000009a R14: 00000000004c3307 R15: 00007f88ba07f6d4 06:56:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x202000) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$KVM_PPC_GET_SMMU_INFO(0xffffffffffffffff, 0x8250aea6, &(0x7f0000000040)=""/191) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:41 executing program 3 (fault-call:1 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x60) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x501b40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x200000006) ioprio_get$pid(0x3, 0x0) 06:56:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x68) ioprio_set$pid(0x0, 0x0, 0x0) [ 1636.215796][T31501] FAULT_INJECTION: forcing a failure. [ 1636.215796][T31501] name failslab, interval 1, probability 0, space 0, times 0 [ 1636.244961][T31499] encrypted_key: insufficient parameters specified 06:56:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=@encrypted_load={'load ', 'default', 0x20, 'trusted:', 'trusted:', 0x20, 0x6, 0x20, [0x32, 0x32, 0x32]}, 0x37, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r3}) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000280)='U', 0x1, r4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000480)='asymmetric\x00', &(0x7f0000000100)=@keyring={'key_or_keyring:', r5}) r6 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r4) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000280)="084a50975a6507be287193a21822772b2a4554ae7cde1b6cc0a90fccfec89a70c5031eaa88487e19594957d6f7a0c85b6cbf98889ce21066fbf68872a30c00f832bca91d72dbb2d2c0a2cb9141224ab2c42d7d6ed5b6791ea5e8c68bed8b97e4ee7e42ef4b19abf3535a8fbe4bb1a7d1cd0dad307dbfb4f23637f185fb39a4e711f22870b33010f1a2af97f8ecf661000e134b3cb0", 0x95, r6) keyctl$search(0xa, r2, &(0x7f0000000040)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x1}, r6) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1636.308256][T31513] FAULT_INJECTION: forcing a failure. [ 1636.308256][T31513] name failslab, interval 1, probability 0, space 0, times 0 [ 1636.345757][T31501] CPU: 0 PID: 31501 Comm: syz-executor.1 Not tainted 5.7.0-rc3-syzkaller #0 [ 1636.354539][T31501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1636.364596][T31501] Call Trace: [ 1636.367883][T31501] dump_stack+0x1e9/0x30e [ 1636.372208][T31501] should_fail+0x433/0x5b0 [ 1636.376620][T31501] ? tomoyo_realpath_from_path+0xd8/0x630 [ 1636.382324][T31501] should_failslab+0x5/0x20 [ 1636.386837][T31501] __kmalloc+0x74/0x330 [ 1636.390983][T31501] ? tomoyo_realpath_from_path+0xcb/0x630 [ 1636.396682][T31501] tomoyo_realpath_from_path+0xd8/0x630 [ 1636.402226][T31501] tomoyo_path_number_perm+0x18f/0x690 [ 1636.407692][T31501] ? d_alloc_parallel+0x12d7/0x13b0 [ 1636.412888][T31501] tomoyo_path_mknod+0x128/0x150 [ 1636.417818][T31501] security_path_mknod+0xdc/0x160 [ 1636.422837][T31501] path_openat+0xbdb/0x38b0 [ 1636.427354][T31501] do_filp_open+0x191/0x3a0 [ 1636.431853][T31501] ? _raw_spin_unlock+0x24/0x40 [ 1636.436698][T31501] ? __alloc_fd+0x566/0x600 [ 1636.441195][T31501] do_sys_openat2+0x463/0x770 [ 1636.445890][T31501] __x64_sys_creat+0xd3/0x100 [ 1636.450554][T31501] do_syscall_64+0xf3/0x1b0 [ 1636.455047][T31501] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1636.460925][T31501] RIP: 0033:0x45c829 [ 1636.464810][T31501] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1636.484397][T31501] RSP: 002b:00007f88ba07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1636.492818][T31501] RAX: ffffffffffffffda RBX: 00000000004db140 RCX: 000000000045c829 [ 1636.500786][T31501] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 1636.508740][T31501] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1636.516694][T31501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1636.524650][T31501] R13: 000000000000009a R14: 00000000004c3307 R15: 00007f88ba07f6d4 [ 1636.532625][T31513] CPU: 1 PID: 31513 Comm: syz-executor.3 Not tainted 5.7.0-rc3-syzkaller #0 [ 1636.541297][T31513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1636.551348][T31513] Call Trace: [ 1636.554641][T31513] dump_stack+0x1e9/0x30e [ 1636.558975][T31513] should_fail+0x433/0x5b0 [ 1636.563400][T31513] ? kzalloc+0x16/0x30 [ 1636.567466][T31513] should_failslab+0x5/0x20 [ 1636.571966][T31513] __kmalloc+0x74/0x330 [ 1636.576125][T31513] kzalloc+0x16/0x30 [ 1636.580020][T31513] bpf_prog_test_run_skb+0xf5/0x1770 [ 1636.585317][T31513] ? __fget_files+0x4b9/0x4e0 [ 1636.590009][T31513] ? trace_bpf_test_finish+0x280/0x280 [ 1636.595469][T31513] __do_sys_bpf+0x48fe/0xf980 [ 1636.600152][T31513] ? rcu_lock_release+0x5/0x20 [ 1636.604938][T31513] ? ksys_write+0x1b1/0x220 [ 1636.609442][T31513] ? ksys_write+0x1b1/0x220 [ 1636.613945][T31513] ? check_preemption_disabled+0xb0/0x240 [ 1636.619660][T31513] ? debug_smp_processor_id+0x5/0x20 [ 1636.622344][T31538] encrypted_key: insufficient parameters specified [ 1636.624938][T31513] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 1636.624950][T31513] ? entry_SYSCALL_64_after_hwframe+0x3e/0xb3 [ 1636.624970][T31513] do_syscall_64+0xf3/0x1b0 [ 1636.624981][T31513] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1636.624994][T31513] RIP: 0033:0x45c829 [ 1636.657460][T31513] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1636.674064][T31501] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1636.677053][T31513] RSP: 002b:00007f3d1c303c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1636.677065][T31513] RAX: ffffffffffffffda RBX: 00000000004da180 RCX: 000000000045c829 [ 1636.677071][T31513] RDX: 0000000000000040 RSI: 0000000020000040 RDI: 000000000000000a 06:56:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6c6f61642065636e797074667320757375723a7573747ab755f78b4d9bdc08e6a1c29be15bfde2c90a3aec13f644230b319de790f965723a20303030303030"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r3, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a41a2b9a6ff0f0000550b044ad52b6a3217828ad831d7830a03942f46cde7188b00e7ff0000000011c10500", 0xfffffffffffffffe}, 0x60) sendmsg$sock(r3, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r4, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r4, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000000340)={0x0, 0x0}) process_vm_readv(r5, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) clone3(&(0x7f00000002c0)={0x11010200, &(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0), {0x4}, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=""/76, &(0x7f0000000280)=[r5], 0x1}, 0x50) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x6c) ioprio_set$pid(0x0, 0x0, 0x0) [ 1636.677077][T31513] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1636.677084][T31513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1636.677090][T31513] R13: 000000000000005b R14: 00000000004c2f8b R15: 00007f3d1c3046d4 06:56:42 executing program 1 (fault-call:0 fault-nth:6): creat(&(0x7f00000000c0)='./file0\x00', 0x0) 06:56:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r1, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:42 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6c}}]}) [ 1636.841965][T31544] encrypted_key: insufficient parameters specified 06:56:42 executing program 3 (fault-call:1 fault-nth:1): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsmount(r1, 0x1, 0x4) setsockopt$inet_int(r1, 0x0, 0xd, &(0x7f0000000000)=0x4, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1636.939847][T31556] encrypted_key: insufficient parameters specified 06:56:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x74) ioprio_set$pid(0x0, 0x0, 0x0) [ 1636.980536][T31557] FAULT_INJECTION: forcing a failure. [ 1636.980536][T31557] name failslab, interval 1, probability 0, space 0, times 0 06:56:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='load ecryptfs u3er:user: 0I0000000000S0000065 \x00'], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r2, &(0x7f00000001c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b044ad5526c6e898cbb38c310d32b6a3217fa0cb9e9cafe0569942f46cde7188b00"}, 0x60) sendmsg$sock(r2, &(0x7f0000000240)={&(0x7f0000000140)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000001340)="9c44c606e74f030935b5ea64139f67f6efd3b01136c18c71b5b40dac082c86c739f6f8152dc43fc8fa8efc055671bf511d6f1d1cc9fcd0b4143f98798254da954e5b69aaf8d8f2d51503cd38301929ea963486dbe444b2cabfc9bef602945cac34ec936f6ca7cf1ad9c116e8a508bc723c938dd1a2793e2feb163f225f197137ecc5f5aad0368c23288e5e1b2980def1c80ad6be7c0206035fcfd210172405681d14cb071936a1700674e3bff918679bcac6b28d7b06f749b9188ae4be7f51f0036fcbb5e7adf765a95c669cb9104248c81c4ff4e83d2463d5067eed11ee18d969", 0xe1}], 0x1}, 0x0) fcntl$setflags(r2, 0x2, 0x1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16, 0x2}, &(0x7f0000000040)=0x0) openat$smackfs_cipsonum(0xffffffffffffff9c, &(0x7f0000000280)='/sys/fs/smackfs/mapped\x00', 0x2, 0x0) timer_settime(r3, 0x1, &(0x7f00000000c0)={{}, {0x0, 0x3938700}}, &(0x7f00000001c0)) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1637.022680][T31562] FAULT_INJECTION: forcing a failure. [ 1637.022680][T31562] name failslab, interval 1, probability 0, space 0, times 0 [ 1637.067227][T31557] CPU: 0 PID: 31557 Comm: syz-executor.1 Not tainted 5.7.0-rc3-syzkaller #0 [ 1637.075925][T31557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.085985][T31557] Call Trace: [ 1637.089278][T31557] dump_stack+0x1e9/0x30e [ 1637.093617][T31557] should_fail+0x433/0x5b0 [ 1637.095142][T31573] encrypted_key: master key parameter 'u3er:user:' is invalid [ 1637.098036][T31557] ? ext4_alloc_inode+0x1b/0x500 [ 1637.098075][T31557] should_failslab+0x5/0x20 06:56:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000000)={0x6000, 0x2, 0xff, 0x1f}) [ 1637.098087][T31557] kmem_cache_alloc+0x53/0x2d0 [ 1637.098096][T31557] ? set_qf_name+0x3d0/0x3d0 [ 1637.098109][T31557] ext4_alloc_inode+0x1b/0x500 [ 1637.129034][T31557] ? set_qf_name+0x3d0/0x3d0 [ 1637.133632][T31557] new_inode_pseudo+0x64/0x240 [ 1637.138397][T31557] new_inode+0x25/0x1d0 [ 1637.142552][T31557] ? rcu_read_lock_sched_held+0x106/0x170 [ 1637.148384][T31557] __ext4_new_inode+0x5a5/0x5a00 [ 1637.153326][T31557] ? __d_add+0x53f/0x820 [ 1637.157629][T31557] ? ext4_lookup+0x6b2/0xbe0 [ 1637.162223][T31557] ext4_create+0x1eb/0x450 06:56:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r1, 0xc0045516, &(0x7f0000000000)=0x1) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) io_setup(0x83, &(0x7f00000003c0)=0x0) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r4, 0x0) io_submit(r3, 0x1, &(0x7f00000004c0)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x2}]) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) io_submit(r3, 0x1, &(0x7f00000001c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x8000, r5, &(0x7f0000000300)="0a1380ca205fb751246d940cd8fe7f1d91302da44003ddcbac9d7cc913342daef074d6166b27411c9b28cd21ce0c1ae941f624536818bbc169892c0c0fb5b4cb95097257bace7f20a7b328a0e700074da16309f48f780c7586ba104bed0f224ba315c6065403718c7aa13334c59daf5e40c56155", 0x74, 0x4, 0x0, 0x2}]) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r6, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) r7 = getpgid(r6) prctl$PR_GET_DUMPABLE(0x3) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r1, 0xc034564b, &(0x7f0000000040)={0xbdc3, 0x33524742, 0x5, 0x5, 0x2, @discrete={0x1ff, 0x8000}}) ptrace$setopts(0x4206, r7, 0x401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:42 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x74}}]}) [ 1637.166640][T31557] ? ext4_lookup+0xbe0/0xbe0 [ 1637.171222][T31557] path_openat+0x17ee/0x38b0 [ 1637.175844][T31557] do_filp_open+0x191/0x3a0 [ 1637.180355][T31557] ? _raw_spin_unlock+0x24/0x40 [ 1637.185199][T31557] ? __alloc_fd+0x566/0x600 [ 1637.189710][T31557] do_sys_openat2+0x463/0x770 [ 1637.194394][T31557] __x64_sys_creat+0xd3/0x100 [ 1637.199093][T31557] do_syscall_64+0xf3/0x1b0 [ 1637.203597][T31557] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1637.209484][T31557] RIP: 0033:0x45c829 [ 1637.213372][T31557] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1637.232970][T31557] RSP: 002b:00007f88ba07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1637.238512][T31579] __report_access: 5 callbacks suppressed [ 1637.238520][T31579] ptrace attach of "/root/syz-executor.2"[7287] was attempted by "/root/syz-executor.2"[31579] [ 1637.241370][T31557] RAX: ffffffffffffffda RBX: 00000000004db140 RCX: 000000000045c829 [ 1637.241377][T31557] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 1637.241382][T31557] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1637.241388][T31557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1637.241394][T31557] R13: 000000000000009a R14: 00000000004c3307 R15: 00007f88ba07f6d4 [ 1637.261835][T31562] CPU: 0 PID: 31562 Comm: syz-executor.3 Not tainted 5.7.0-rc3-syzkaller #0 [ 1637.306182][T31562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.316232][T31562] Call Trace: [ 1637.319522][T31562] dump_stack+0x1e9/0x30e [ 1637.323855][T31562] should_fail+0x433/0x5b0 [ 1637.328273][T31562] ? bpf_prog_test_run_skb+0x27e/0x1770 [ 1637.333819][T31562] should_failslab+0x5/0x20 [ 1637.338326][T31562] kmem_cache_alloc_trace+0x57/0x300 [ 1637.343607][T31562] ? bpf_ctx_init+0x14c/0x190 [ 1637.348284][T31562] bpf_prog_test_run_skb+0x27e/0x1770 [ 1637.353668][T31562] ? trace_bpf_test_finish+0x280/0x280 [ 1637.359126][T31562] __do_sys_bpf+0x48fe/0xf980 [ 1637.363804][T31562] ? rcu_lock_release+0x5/0x20 [ 1637.368585][T31562] ? ksys_write+0x1b1/0x220 [ 1637.373089][T31562] ? ksys_write+0x1b1/0x220 [ 1637.377595][T31562] ? check_preemption_disabled+0xb0/0x240 [ 1637.383312][T31562] ? debug_smp_processor_id+0x5/0x20 [ 1637.388606][T31562] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 1637.394323][T31562] ? entry_SYSCALL_64_after_hwframe+0x3e/0xb3 [ 1637.400394][T31562] do_syscall_64+0xf3/0x1b0 [ 1637.404902][T31562] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1637.410789][T31562] RIP: 0033:0x45c829 [ 1637.414679][T31562] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1637.424871][T31585] EXT4-fs: 12 callbacks suppressed [ 1637.424879][T31585] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000074, [ 1637.434273][T31562] RSP: 002b:00007f3d1c303c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1637.434285][T31562] RAX: ffffffffffffffda RBX: 00000000004da180 RCX: 000000000045c829 06:56:42 executing program 1 (fault-call:0 fault-nth:7): creat(&(0x7f00000000c0)='./file0\x00', 0x0) 06:56:42 executing program 3 (fault-call:1 fault-nth:2): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 1637.434290][T31562] RDX: 0000000000000040 RSI: 0000000020000040 RDI: 000000000000000a [ 1637.434295][T31562] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1637.434300][T31562] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1637.434306][T31562] R13: 000000000000005b R14: 00000000004c2f8b R15: 00007f3d1c3046d4 06:56:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1637.525583][T31582] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1637.563358][T31599] FAULT_INJECTION: forcing a failure. [ 1637.563358][T31599] name failslab, interval 1, probability 0, space 0, times 0 06:56:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x7a) ioprio_set$pid(0x0, 0x0, 0x0) [ 1637.566205][T31598] FAULT_INJECTION: forcing a failure. [ 1637.566205][T31598] name failslab, interval 1, probability 0, space 0, times 0 [ 1637.609459][T31599] CPU: 0 PID: 31599 Comm: syz-executor.3 Not tainted 5.7.0-rc3-syzkaller #0 [ 1637.618160][T31599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.628213][T31599] Call Trace: [ 1637.631499][T31599] dump_stack+0x1e9/0x30e [ 1637.635815][T31599] should_fail+0x433/0x5b0 [ 1637.640217][T31599] ? build_skb+0x26/0x410 [ 1637.644522][T31599] should_failslab+0x5/0x20 [ 1637.649028][T31599] kmem_cache_alloc+0x53/0x2d0 [ 1637.653778][T31599] build_skb+0x26/0x410 [ 1637.657907][T31599] bpf_prog_test_run_skb+0x339/0x1770 [ 1637.663256][T31599] ? trace_bpf_test_finish+0x280/0x280 [ 1637.668688][T31599] __do_sys_bpf+0x48fe/0xf980 [ 1637.673340][T31599] ? rcu_lock_release+0x5/0x20 [ 1637.678090][T31599] ? ksys_write+0x1b1/0x220 [ 1637.682566][T31599] ? ksys_write+0x1b1/0x220 [ 1637.687043][T31599] ? check_preemption_disabled+0xb0/0x240 [ 1637.692741][T31599] ? debug_smp_processor_id+0x5/0x20 [ 1637.698006][T31599] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 1637.703698][T31599] ? entry_SYSCALL_64_after_hwframe+0x3e/0xb3 [ 1637.709741][T31599] do_syscall_64+0xf3/0x1b0 [ 1637.714221][T31599] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1637.720086][T31599] RIP: 0033:0x45c829 [ 1637.723953][T31599] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1637.743530][T31599] RSP: 002b:00007f3d1c303c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1637.751912][T31599] RAX: ffffffffffffffda RBX: 00000000004da180 RCX: 000000000045c829 [ 1637.759857][T31599] RDX: 0000000000000040 RSI: 0000000020000040 RDI: 000000000000000a [ 1637.767800][T31599] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1637.775746][T31599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1637.783691][T31599] R13: 000000000000005b R14: 00000000004c2f8b R15: 00007f3d1c3046d4 [ 1637.808833][T31598] CPU: 0 PID: 31598 Comm: syz-executor.1 Not tainted 5.7.0-rc3-syzkaller #0 [ 1637.817521][T31598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1637.827573][T31598] Call Trace: [ 1637.830974][T31598] dump_stack+0x1e9/0x30e [ 1637.835316][T31598] should_fail+0x433/0x5b0 [ 1637.839743][T31598] ? tomoyo_encode2+0x25a/0x560 [ 1637.844770][T31598] should_failslab+0x5/0x20 [ 1637.849275][T31598] __kmalloc+0x74/0x330 [ 1637.853437][T31598] tomoyo_encode2+0x25a/0x560 [ 1637.858123][T31598] tomoyo_realpath_from_path+0x5d6/0x630 [ 1637.863883][T31598] tomoyo_path_number_perm+0x18f/0x690 [ 1637.869380][T31598] ? d_alloc_parallel+0x12d7/0x13b0 [ 1637.874581][T31598] tomoyo_path_mknod+0x128/0x150 [ 1637.876919][T31603] encrypted_key: insufficient parameters specified [ 1637.879523][T31598] security_path_mknod+0xdc/0x160 [ 1637.879544][T31598] path_openat+0xbdb/0x38b0 [ 1637.892210][T31603] encrypted_key: insufficient parameters specified [ 1637.895638][T31598] do_filp_open+0x191/0x3a0 [ 1637.895660][T31598] ? _raw_spin_unlock+0x24/0x40 [ 1637.911534][T31598] ? __alloc_fd+0x566/0x600 [ 1637.916079][T31598] do_sys_openat2+0x463/0x770 [ 1637.920790][T31598] __x64_sys_creat+0xd3/0x100 [ 1637.925446][T31598] do_syscall_64+0xf3/0x1b0 [ 1637.929983][T31598] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1637.935852][T31598] RIP: 0033:0x45c829 [ 1637.939720][T31598] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1637.959329][T31598] RSP: 002b:00007f88ba07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1637.967713][T31598] RAX: ffffffffffffffda RBX: 00000000004db140 RCX: 000000000045c829 06:56:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='load ecryptfs user:user: 000 0000000000000065 \x00'], 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', 'trusted\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:43 executing program 3 (fault-call:1 fault-nth:3): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x300) ioprio_set$pid(0x0, 0x0, 0x0) [ 1637.975662][T31598] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 1637.983603][T31598] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1637.991563][T31598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1637.999515][T31598] R13: 000000000000009a R14: 00000000004c3307 R15: 00007f88ba07f6d4 [ 1638.015997][T31598] ERROR: Out of memory at tomoyo_realpath_from_path. 06:56:43 executing program 1 (fault-call:0 fault-nth:8): creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1638.057509][T31610] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x0000000000000074, [ 1638.141195][T31625] FAULT_INJECTION: forcing a failure. [ 1638.141195][T31625] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.154029][T31625] CPU: 1 PID: 31625 Comm: syz-executor.3 Not tainted 5.7.0-rc3-syzkaller #0 [ 1638.162700][T31625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1638.172754][T31625] Call Trace: [ 1638.176045][T31625] dump_stack+0x1e9/0x30e [ 1638.180379][T31625] should_fail+0x433/0x5b0 [ 1638.184801][T31625] ? skb_clone+0x1b2/0x370 [ 1638.189211][T31625] should_failslab+0x5/0x20 [ 1638.193698][T31625] kmem_cache_alloc+0x53/0x2d0 [ 1638.198439][T31625] skb_clone+0x1b2/0x370 [ 1638.202662][T31625] bpf_clone_redirect+0xa2/0x350 [ 1638.207572][T31625] ? __lock_acquire+0x116c/0x2c30 [ 1638.212576][T31625] bpf_prog_3d1649e183dc2cc1+0x5c/0xf74 [ 1638.218115][T31625] ? ktime_get+0x4a/0x100 [ 1638.222417][T31625] ? read_seqcount_begin+0x122/0x1c0 [ 1638.227675][T31625] ? ktime_get+0x4a/0x100 [ 1638.231978][T31625] ? read_seqcount_begin+0x177/0x1c0 [ 1638.237248][T31625] ? ktime_get+0xdb/0x100 [ 1638.241553][T31625] bpf_test_run+0x61d/0x8e0 [ 1638.246049][T31625] bpf_prog_test_run_skb+0x7de/0x1770 [ 1638.251403][T31625] ? trace_bpf_test_finish+0x280/0x280 [ 1638.256847][T31625] __do_sys_bpf+0x48fe/0xf980 [ 1638.261500][T31625] ? rcu_lock_release+0x5/0x20 [ 1638.266263][T31625] ? ksys_write+0x1b1/0x220 [ 1638.270737][T31625] ? ksys_write+0x1b1/0x220 [ 1638.275215][T31625] ? check_preemption_disabled+0xb0/0x240 [ 1638.280905][T31625] ? debug_smp_processor_id+0x5/0x20 [ 1638.286173][T31625] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 1638.291873][T31625] ? entry_SYSCALL_64_after_hwframe+0x3e/0xb3 [ 1638.297919][T31625] do_syscall_64+0xf3/0x1b0 [ 1638.302401][T31625] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1638.308278][T31625] RIP: 0033:0x45c829 [ 1638.312147][T31625] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1638.331744][T31625] RSP: 002b:00007f3d1c303c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 06:56:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000040)) [ 1638.340125][T31625] RAX: ffffffffffffffda RBX: 00000000004da180 RCX: 000000000045c829 [ 1638.348075][T31625] RDX: 0000000000000040 RSI: 0000000020000040 RDI: 000000000000000a [ 1638.356019][T31625] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1638.363964][T31625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1638.371919][T31625] R13: 000000000000005b R14: 00000000004c2f8b R15: 00007f3d1c3046d4 06:56:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x500) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:43 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7a}}]}) [ 1638.427960][T31638] FAULT_INJECTION: forcing a failure. [ 1638.427960][T31638] name failslab, interval 1, probability 0, space 0, times 0 [ 1638.498793][T31638] CPU: 1 PID: 31638 Comm: syz-executor.1 Not tainted 5.7.0-rc3-syzkaller #0 [ 1638.507522][T31638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1638.517574][T31638] Call Trace: [ 1638.520869][T31638] dump_stack+0x1e9/0x30e [ 1638.525217][T31638] should_fail+0x433/0x5b0 [ 1638.529651][T31638] ? ext4_alloc_inode+0x1b/0x500 [ 1638.534594][T31638] should_failslab+0x5/0x20 [ 1638.539099][T31638] kmem_cache_alloc+0x53/0x2d0 [ 1638.543866][T31638] ? set_qf_name+0x3d0/0x3d0 [ 1638.548251][T31649] ptrace attach of "/root/syz-executor.2"[7287] was attempted by "/root/syz-executor.2"[31649] [ 1638.548455][T31638] ext4_alloc_inode+0x1b/0x500 [ 1638.548465][T31638] ? set_qf_name+0x3d0/0x3d0 [ 1638.548479][T31638] new_inode_pseudo+0x64/0x240 [ 1638.572874][T31638] new_inode+0x25/0x1d0 [ 1638.577031][T31638] ? rcu_read_lock_sched_held+0x106/0x170 [ 1638.582757][T31638] __ext4_new_inode+0x5a5/0x5a00 [ 1638.587704][T31638] ? __d_add+0x53f/0x820 [ 1638.591971][T31638] ? ext4_lookup+0x6b2/0xbe0 [ 1638.596572][T31638] ext4_create+0x1eb/0x450 [ 1638.601001][T31638] ? ext4_lookup+0xbe0/0xbe0 [ 1638.605608][T31638] path_openat+0x17ee/0x38b0 [ 1638.610251][T31638] do_filp_open+0x191/0x3a0 [ 1638.612624][T31649] ptrace attach of "/root/syz-executor.2"[7287] was attempted by "/root/syz-executor.2"[31649] [ 1638.614755][T31638] ? _raw_spin_unlock+0x24/0x40 [ 1638.614769][T31638] ? __alloc_fd+0x566/0x600 [ 1638.614793][T31638] do_sys_openat2+0x463/0x770 [ 1638.614812][T31638] __x64_sys_creat+0xd3/0x100 [ 1638.643850][T31638] do_syscall_64+0xf3/0x1b0 06:56:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r3, 0x0, r3) fsetxattr$security_ima(r3, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@ng={0x4, 0x5, "f283aebaa1f3850ed0d841583796"}, 0x10, 0x2) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r4, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x0) ioprio_get$pid(0x1, r4) 06:56:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x600) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x700) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0x900) ioprio_set$pid(0x0, 0x0, 0x0) [ 1638.648357][T31638] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1638.654247][T31638] RIP: 0033:0x45c829 [ 1638.658135][T31638] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1638.677738][T31638] RSP: 002b:00007f88ba07ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 1638.686157][T31638] RAX: ffffffffffffffda RBX: 00000000004db140 RCX: 000000000045c829 06:56:44 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$NFNL_MSG_CTHELPER_GET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x4c, 0x1, 0x9, 0x101, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x4}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x7}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8}}, @NFCTH_STATUS={0x8}, @NFCTH_STATUS={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x840}, 0x44010) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$vsock_stream(r5, &(0x7f0000000240)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x800) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1638.694137][T31638] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200000c0 [ 1638.702550][T31638] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1638.710525][T31638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1638.718505][T31638] R13: 000000000000009a R14: 00000000004c3307 R15: 00007f88ba07f6d4 [ 1638.831081][T31673] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes [ 1638.946335][T31680] EXT4-fs (sda1): re-mounted. Opts: debug_want_extra_isize=0x000000000000007a, [ 1638.958829][ T7160] EXT4-fs error: 150 callbacks suppressed [ 1638.958842][ T7160] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15848: comm syz-executor.1: corrupted xattr entries [ 1639.002631][ T7310] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15848: comm syz-executor.3: corrupted xattr entries 06:56:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000000c0)="b9ff0302600d698cb89e14f088a8", 0x0, 0xfffffffc, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 06:56:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0xa00) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000040)={0x3, 0x100, 0x1, {0xc, 0x101, 0x7c, 0x3f}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) 06:56:44 executing program 0: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0xc0000) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="340000001000050d00"/20, @ANYRES32=r5, @ANYBLOB="000000000000000014001280090001007663616e0000000004000280"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x0, 0x0, {0x2, 0x1f, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=@ipv4_newaddr={0x20, 0x11, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r5}, [@IFA_LOCAL={0x8, 0x2, @multicast1}]}, 0x20}, 0x1, 0xf0ffffff}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=@delqdisc={0x1d8, 0x25, 0x300, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x4, 0xf}, {0x1, 0xc}, {0x0, 0x10}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0xfffffff8}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x4}, @qdisc_kind_options=@q_plug={{0x9, 0x1, 'plug\x00'}, {0xc, 0x2, {0x2, 0x1}}}, @TCA_STAB={0x108, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x51, 0x8d, 0x7fff, 0xff, 0x0, 0x20, 0x8b, 0x5}}, {0xe, 0x2, [0x80, 0x7, 0x2, 0x81, 0x8]}}, {{0x1c, 0x1, {0x5, 0x9, 0x2, 0x1ff, 0x0, 0x7, 0x2, 0x3}}, {0xa, 0x2, [0x4, 0x2, 0x2]}}, {{0x1c, 0x1, {0x6d, 0x7, 0x2, 0x7, 0x2, 0x0, 0xfffffff8, 0x7}}, {0x12, 0x2, [0x1, 0x101, 0x8001, 0x2cf2, 0x800, 0x9, 0x9]}}, {{0x1c, 0x1, {0xbc, 0xff, 0x0, 0x1ff, 0x1, 0x4, 0x80000001, 0x6}}, {0x10, 0x2, [0x4, 0x1, 0x4, 0x101, 0x1e, 0x3]}}, {{0x1c, 0x1, {0x70, 0x4a, 0x4, 0x0, 0xd42527b7635cae65, 0x5, 0x8, 0x5}}, {0xe, 0x2, [0x9, 0x80, 0xfffd, 0x1, 0x3]}}, {{0x1c, 0x1, {0x81, 0x64, 0x3ff, 0x81, 0x2, 0x3, 0x7, 0x4}}, {0xc, 0x2, [0x2, 0x7f, 0xfff9, 0x5]}}]}, @TCA_RATE={0x6, 0x5, {0x5, 0x6}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x8c9}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x4}, @TCA_STAB={0x5c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x8, 0x7, 0xfff7, 0x9, 0x2, 0x18, 0x9, 0x7}}, {0x12, 0x2, [0x7, 0x7, 0x7fff, 0x7, 0x4, 0xdd6c, 0xbe16]}}, {{0x1c, 0x1, {0x1, 0x5, 0xbb, 0x7, 0x2, 0x61, 0x72, 0x3}}, {0xa, 0x2, [0x4, 0x2, 0x9]}}]}, @qdisc_kind_options=@q_qfg={0x8, 0x1, 'qfq\x00'}, @TCA_RATE={0x6, 0x5, {0x5, 0x1}}]}, 0x1d8}, 0x1, 0x0, 0x0, 0xc080}, 0x20008000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000400)='security.evm\x00', &(0x7f0000000440)=@md5={0x1, "d3cadb1c52fcf115944973a08cce68f5"}, 0x11, 0x1d9375108ed6fb46) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_load={'load ', 'ecryptfs', 0x20, 'user:', 'user:', 0x20, 0x41}, 0x2f, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 06:56:44 executing program 1 (fault-call:0 fault-nth:9): creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 1639.474050][T31688] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15983: comm syz-executor.0: corrupted xattr entries [ 1639.488454][T31689] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15992: comm syz-executor.4: corrupted xattr entries [ 1639.492249][T31687] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15985: comm syz-executor.2: corrupted xattr entries 06:56:44 executing program 5: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1083004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x28, &(0x7f0000000340)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x300}}]}) [ 1639.569355][T30629] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15786: comm syz-executor.1: bad extra_isize 6 (inode size 256) [ 1639.585201][T30605] EXT4-fs error (device sda1): __ext4_expand_extra_isize:5651: inode #15898: comm syz-executor.1: bad extra_isize 6 (inode size 256) [ 1639.623983][ T7433] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15848: comm syz-executor.5: corrupted xattr entries [ 1639.638152][T30276] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #15864: comm syz-executor.1: corrupted in-inode xattr [ 1639.654410][T12395] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #16355: comm syz-executor.1: corrupted in-inode xattr [ 1639.658444][T30644] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2775: Unable to expand inode 15861. Delete some EAs or run e2fsck. [ 1639.682671][T30336] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2775: Unable to expand inode 15853. Delete some EAs or run e2fsck. [ 1639.687722][T29940] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2775: Unable to expand inode 16055. Delete some EAs or run e2fsck. [ 1639.709408][T12062] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2775: Unable to expand inode 16373. Delete some EAs or run e2fsck. [ 1639.723105][T29921] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2775: Unable to expand inode 16060. Delete some EAs or run e2fsck. [ 1639.736727][T30362] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2775: Unable to expand inode 15851. Delete some EAs or run e2fsck. [ 1639.744379][T12128] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2775: Unable to expand inode 16383. Delete some EAs or run e2fsck. [ 1639.763686][T30484] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2775: Unable to expand inode 15887. Delete some EAs or run e2fsck. [ 1639.772095][T30867] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2775: Unable to expand inode 16018. Delete some EAs or run e2fsck. [ 1639.792405][T15118] EXT4-fs warning (device sda1): ext4_expand_extra_isize_ea:2775: Unable to expand inode 16339. Delete some EAs or run e2fsck. [ 1641.427438][T31700] encrypted_key: keylen for the ecryptfs format must be equal to 64 bytes 06:56:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/67, 0x43}], 0x1, &(0x7f0000002340)=[{&(0x7f0000000200)=""/214, 0xd6}], 0x1, 0xb00) ioprio_set$pid(0x0, 0x0, 0x0) 06:56:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6c6f616420656372797074667320757365723a757365723a2030303030103030303030303030303030303036352000ff5adef866d3119d3ed70c38dc6c71af2a08b1a9ad85d66fc811c4de336d91d01fe937571749f998d7e7ddcdffd8591bc74cf506561a4ded4861c49f1767a63517ce7299395c7ff6250a4354d5e6f5367aae44b9cec5bb210ab53c3fc9ee321c830e1a33d2e4ad35d2873a80f55c0ef159a5e9016de835ad30dea98a6efe03abc1d7743936eed6dda5c0a686af57b4f82dc573fd1e007891bf13a6e86ae8b247dbdfae8ebada20e0ae"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) [ 1643.045498][ T507] tipc: TX() has been purged, node left! 06:56:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$rds(0x15, 0x5, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioprio_get$pid(0x3, 0x0) [ 1644.249527][T16148] EXT4-fs error: 540 callbacks suppressed [ 1644.249540][T16148] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #16315: comm syz-executor.2: corrupted in-inode xattr [ 1644.252830][T15341] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #15765: comm syz-executor.2: corrupted in-inode xattr [ 1644.257411][T16168] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #16312: comm syz-executor.2: corrupted in-inode xattr [ 1644.272053][T16011] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #16316: comm syz-executor.2: corrupted in-inode xattr [ 1644.285293][T24397] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #15909: comm syz-executor.2: corrupted in-inode xattr [ 1644.296459][T27049] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #15785: comm syz-executor.2: corrupted in-inode xattr [ 1644.310424][T24577] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #16234: comm syz-executor.2: corrupted in-inode xattr [ 1644.328173][T26752] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #16144: comm syz-executor.2: corrupted in-inode xattr [ 1644.335792][T22099] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #16246: comm syz-executor.2: corrupted in-inode xattr [ 1644.348120][T27076] EXT4-fs error (device sda1): ext4_expand_extra_isize_ea:2708: inode #16157: comm syz-executor.2: corrupted in-inode xattr [ 1650.015900][ T7009] EXT4-fs error: 106 callbacks suppressed [ 1650.015911][ T7009] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15964: comm syz-fuzzer: corrupted xattr entries [ 1650.053912][ T7028] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15964: comm syz-fuzzer: corrupted xattr entries [ 1650.080566][ T7010] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15964: comm syz-fuzzer: corrupted xattr entries [ 1650.111532][T31727] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15964: comm syz-fuzzer: corrupted xattr entries [ 1650.151524][T31728] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15964: comm syz-fuzzer: corrupted xattr entries [ 1650.988539][T31729] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15979: comm syz-fuzzer: corrupted xattr entries [ 1651.957652][T31728] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15980: comm syz-fuzzer: corrupted xattr entries [ 1653.099389][T31729] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15981: comm syz-fuzzer: corrupted xattr entries [ 1653.115541][ T7011] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15981: comm syz-fuzzer: corrupted xattr entries [ 1653.138404][ T7006] EXT4-fs error (device sda1): ext4_xattr_set_entry:1583: inode #15981: comm syz-fuzzer: corrupted xattr entries [ 1655.284578][ T7011] ================================================================== [ 1655.293237][ T7011] BUG: KASAN: use-after-free in ext4_xattr_set_entry+0x1863/0x3830 [ 1655.301624][ T7011] Read of size 4 at addr ffff888039437ffe by task syz-fuzzer/7011 [ 1655.309585][ T7011] [ 1655.311930][ T7011] CPU: 1 PID: 7011 Comm: syz-fuzzer Not tainted 5.7.0-rc3-syzkaller #0 [ 1655.320321][ T7011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1655.330381][ T7011] Call Trace: [ 1655.333683][ T7011] dump_stack+0x1e9/0x30e [ 1655.338011][ T7011] print_address_description+0x74/0x5c0 [ 1655.343806][ T7011] ? vprintk_emit+0x342/0x3c0 [ 1655.348468][ T7011] ? printk+0x62/0x83 [ 1655.352565][ T7011] ? trace_irq_disable_rcuidle+0x1f/0x1d0 [ 1655.358524][ T7011] __kasan_report+0x103/0x1a0 [ 1655.363320][ T7011] ? ext4_xattr_set_entry+0x1863/0x3830 [ 1655.368847][ T7011] ? ext4_xattr_set_entry+0x1863/0x3830 [ 1655.374466][ T7011] kasan_report+0x4d/0x80 [ 1655.378796][ T7011] ? check_memory_region+0x2b5/0x2f0 [ 1655.384062][ T7011] ? ext4_xattr_set_entry+0x1863/0x3830 [ 1655.389588][ T7011] ? memmove+0x25/0x60 [ 1655.393823][ T7011] ? ext4_xattr_set_entry+0x1863/0x3830 [ 1655.399603][ T7011] ? ext4_xattr_set_handle+0xdc3/0x1f30 [ 1655.405315][ T7011] ? ext4_initxattrs+0xa2/0x100 [ 1655.410279][ T7011] ? security_inode_init_security+0x236/0x300 [ 1655.417371][ T7011] ? ext4_init_security+0x40/0x40 [ 1655.422393][ T7011] ? __ext4_new_inode+0x46c9/0x5a00 [ 1655.427675][ T7011] ? ext4_mkdir+0x3bf/0x1460 [ 1655.432466][ T7011] ? smack_inode_permission+0x241/0x2b0 [ 1655.438012][ T7011] ? vfs_mkdir+0x42a/0x620 [ 1655.442485][ T7011] ? do_mkdirat+0x1b9/0x310 [ 1655.446996][ T7011] ? do_syscall_64+0xf3/0x1b0 [ 1655.452001][ T7011] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1655.458138][ T7011] [ 1655.460451][ T7011] The buggy address belongs to the page: [ 1655.466194][ T7011] page:ffffea0000e50dc0 refcount:2 mapcount:0 mapping:00000000964a8bf7 index:0x421 [ 1655.475576][ T7011] def_blk_aops [ 1655.479084][ T7011] flags: 0xfffe000000203a(referenced|dirty|lru|active|private) [ 1655.486723][ T7011] raw: 00fffe000000203a ffffea00022bab48 ffffea0000e55cc8 ffff88821804eb60 [ 1655.495399][ T7011] raw: 0000000000000421 ffff888039f180e8 00000002ffffffff ffff88821bb96000 [ 1655.504053][ T7011] page dumped because: kasan: bad access detected [ 1655.510515][ T7011] page->mem_cgroup:ffff88821bb96000 [ 1655.515724][ T7011] [ 1655.518034][ T7011] Memory state around the buggy address: [ 1655.523643][ T7011] ffff888039437f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1655.531686][ T7011] ffff888039437f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1655.539729][ T7011] >ffff888039438000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1655.547775][ T7011] ^ [ 1655.551828][ T7011] ffff888039438080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1655.559867][ T7011] ffff888039438100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 1655.567904][ T7011] ================================================================== [ 1655.575939][ T7011] Disabling lock debugging due to kernel taint [ 1655.597236][ T7011] Kernel panic - not syncing: panic_on_warn set ... [ 1655.604033][ T7011] CPU: 1 PID: 7011 Comm: syz-fuzzer Tainted: G B 5.7.0-rc3-syzkaller #0 [ 1655.613640][ T7011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1655.623844][ T7011] Call Trace: [ 1655.627119][ T7011] dump_stack+0x1e9/0x30e [ 1655.631433][ T7011] panic+0x264/0x7a0 [ 1655.635312][ T7011] ? trace_hardirqs_on+0x30/0x70 [ 1655.640471][ T7011] __kasan_report+0x191/0x1a0 [ 1655.645234][ T7011] ? ext4_xattr_set_entry+0x1863/0x3830 [ 1655.650939][ T7011] ? ext4_xattr_set_entry+0x1863/0x3830 [ 1655.656463][ T7011] kasan_report+0x4d/0x80 [ 1655.660935][ T7011] ? check_memory_region+0x2b5/0x2f0 [ 1655.666201][ T7011] ? ext4_xattr_set_entry+0x1863/0x3830 [ 1655.671875][ T7011] ? memmove+0x25/0x60 [ 1655.675929][ T7011] ? ext4_xattr_set_entry+0x1863/0x3830 [ 1655.681700][ T7011] ? ext4_xattr_set_handle+0xdc3/0x1f30 [ 1655.687237][ T7011] ? ext4_initxattrs+0xa2/0x100 [ 1655.692077][ T7011] ? security_inode_init_security+0x236/0x300 [ 1655.698426][ T7011] ? ext4_init_security+0x40/0x40 [ 1655.703441][ T7011] ? __ext4_new_inode+0x46c9/0x5a00 [ 1655.708626][ T7011] ? ext4_mkdir+0x3bf/0x1460 [ 1655.713371][ T7011] ? smack_inode_permission+0x241/0x2b0 [ 1655.718903][ T7011] ? vfs_mkdir+0x42a/0x620 [ 1655.723339][ T7011] ? do_mkdirat+0x1b9/0x310 [ 1655.727831][ T7011] ? do_syscall_64+0xf3/0x1b0 [ 1655.732488][ T7011] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 1655.739949][ T7011] Kernel Offset: disabled [ 1655.744393][ T7011] Rebooting in 86400 seconds..