0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:00 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x9}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 1: pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:00 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfeffff}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000000)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:00 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000000)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x1000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 1 (fault-call:4 fault-nth:0): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x300}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:00 executing program 0 (fault-call:2 fault-nth:0): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:00 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) [ 295.125329][T19304] FAULT_INJECTION: forcing a failure. [ 295.125329][T19304] name failslab, interval 1, probability 0, space 0, times 0 [ 295.151770][T19312] FAULT_INJECTION: forcing a failure. [ 295.151770][T19312] name failslab, interval 1, probability 0, space 0, times 0 [ 295.170691][T19304] CPU: 0 PID: 19304 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 295.178705][T19304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.188761][T19304] Call Trace: [ 295.192063][T19304] dump_stack+0x172/0x1f0 [ 295.196390][T19304] should_fail.cold+0xa/0x15 [ 295.200987][T19304] ? fault_create_debugfs_attr+0x180/0x180 [ 295.206800][T19304] ? page_to_nid.part.0+0x20/0x20 [ 295.211832][T19304] ? ___might_sleep+0x163/0x280 [ 295.216687][T19304] __should_failslab+0x121/0x190 [ 295.221611][T19304] should_failslab+0x9/0x14 [ 295.221623][T19304] __kmalloc_track_caller+0x2dc/0x760 [ 295.221636][T19304] ? __check_object_size+0x3d/0x43c [ 295.221650][T19304] ? wait_for_completion+0x440/0x440 [ 295.221668][T19304] ? strndup_user+0x77/0xd0 [ 295.246473][T19304] memdup_user+0x26/0xb0 [ 295.250733][T19304] strndup_user+0x77/0xd0 [ 295.255076][T19304] __ia32_sys_add_key+0x1a2/0x4f0 [ 295.260141][T19304] ? __x64_sys_add_key+0x4f0/0x4f0 [ 295.265250][T19304] ? entry_SYSENTER_compat+0x68/0x7f [ 295.270538][T19304] ? trace_hardirqs_on+0x67/0x240 [ 295.275572][T19304] do_fast_syscall_32+0x27b/0xdb3 [ 295.280607][T19304] entry_SYSENTER_compat+0x70/0x7f [ 295.285721][T19304] RIP: 0023:0xf7f289c9 [ 295.289794][T19304] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 295.309402][T19304] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 295.317816][T19304] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 23:52:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x900}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:00 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 295.325798][T19304] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 295.333757][T19304] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 295.333764][T19304] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 295.333770][T19304] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 295.376565][T19312] CPU: 1 PID: 19312 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 295.384582][T19312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.394644][T19312] Call Trace: [ 295.397938][T19312] dump_stack+0x172/0x1f0 [ 295.402263][T19312] should_fail.cold+0xa/0x15 [ 295.402281][T19312] ? aa_path_link+0x460/0x460 [ 295.412439][T19312] ? fault_create_debugfs_attr+0x180/0x180 [ 295.418241][T19312] ? page_to_nid.part.0+0x20/0x20 [ 295.418254][T19312] ? ___might_sleep+0x163/0x280 [ 295.418274][T19312] __should_failslab+0x121/0x190 [ 295.428886][T19312] should_failslab+0x9/0x14 [ 295.428897][T19312] __kmalloc+0x2e0/0x770 [ 295.428916][T19312] ? common_file_perm+0x238/0x720 [ 295.438304][T19312] ? kernfs_fop_write+0x33b/0x480 [ 295.438317][T19312] kernfs_fop_write+0x33b/0x480 [ 295.438330][T19312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.438346][T19312] __vfs_write+0x8a/0x110 [ 295.463623][T19312] ? kernfs_fop_open+0xd80/0xd80 [ 295.463638][T19312] vfs_write+0x268/0x5d0 [ 295.463650][T19312] ksys_write+0x14f/0x290 [ 295.463667][T19312] ? __ia32_sys_read+0xb0/0xb0 [ 295.472900][T19312] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.472918][T19312] ? entry_SYSENTER_compat+0x68/0x7f [ 295.497689][T19312] __ia32_sys_write+0x71/0xb0 [ 295.502374][T19312] do_fast_syscall_32+0x27b/0xdb3 [ 295.507417][T19312] entry_SYSENTER_compat+0x70/0x7f [ 295.512524][T19312] RIP: 0023:0xf7f069c9 23:52:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:01 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) [ 295.516602][T19312] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 295.536208][T19312] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 295.544625][T19312] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000180 [ 295.552599][T19312] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 0000000000000000 [ 295.560569][T19312] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 295.568530][T19312] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 295.568541][T19312] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:01 executing program 1 (fault-call:4 fault-nth:1): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:01 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:01 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x9000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:01 executing program 0 (fault-call:2 fault-nth:1): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:01 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:01 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:01 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:01 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) [ 295.865452][T19360] FAULT_INJECTION: forcing a failure. [ 295.865452][T19360] name failslab, interval 1, probability 0, space 0, times 0 [ 295.941810][T19360] CPU: 1 PID: 19360 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 295.949827][T19360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.959887][T19360] Call Trace: [ 295.963185][T19360] dump_stack+0x172/0x1f0 [ 295.967524][T19360] should_fail.cold+0xa/0x15 [ 295.972128][T19360] ? fault_create_debugfs_attr+0x180/0x180 [ 295.977941][T19360] ? ___might_sleep+0x163/0x280 [ 295.982794][T19360] __should_failslab+0x121/0x190 [ 295.987752][T19360] should_failslab+0x9/0x14 [ 295.992261][T19360] kmem_cache_alloc_node_trace+0x274/0x750 [ 295.998080][T19360] __kmalloc_node+0x3d/0x70 [ 296.002582][T19360] kvmalloc_node+0x68/0x100 [ 296.007079][T19360] __ia32_sys_add_key+0x3d5/0x4f0 [ 296.012108][T19360] ? __x64_sys_add_key+0x4f0/0x4f0 [ 296.017225][T19360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.023467][T19360] ? entry_SYSENTER_compat+0x68/0x7f [ 296.028757][T19360] ? trace_hardirqs_on+0x67/0x240 [ 296.033789][T19360] do_fast_syscall_32+0x27b/0xdb3 [ 296.038810][T19360] entry_SYSENTER_compat+0x70/0x7f [ 296.038821][T19360] RIP: 0023:0xf7f289c9 [ 296.038839][T19360] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 296.047969][T19360] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 296.047982][T19360] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 296.048000][T19360] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe 23:52:01 executing program 1 (fault-call:4 fault-nth:2): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:01 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfeffff}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:01 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000080)=0x2, 0x4) 23:52:01 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) [ 296.091906][T19360] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 296.099880][T19360] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 296.107857][T19360] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x40000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:01 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x1000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:01 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:01 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) [ 296.273399][T19401] FAULT_INJECTION: forcing a failure. [ 296.273399][T19401] name failslab, interval 1, probability 0, space 0, times 0 [ 296.307405][T19401] CPU: 1 PID: 19401 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 296.315426][T19401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.325477][T19401] Call Trace: [ 296.328801][T19401] dump_stack+0x172/0x1f0 [ 296.328819][T19401] should_fail.cold+0xa/0x15 [ 296.328834][T19401] ? fault_create_debugfs_attr+0x180/0x180 [ 296.328854][T19401] ? page_to_nid.part.0+0x20/0x20 [ 296.348548][T19401] ? ___might_sleep+0x163/0x280 [ 296.353409][T19401] __should_failslab+0x121/0x190 [ 296.358355][T19401] should_failslab+0x9/0x14 [ 296.362860][T19401] kmem_cache_alloc+0x2aa/0x710 [ 296.367712][T19401] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.373955][T19401] ? __validate_process_creds+0x22d/0x380 [ 296.379681][T19401] prepare_creds+0x3e/0x430 [ 296.384192][T19401] lookup_user_key+0x3f8/0xfb0 [ 296.388962][T19401] ? join_session_keyring+0x340/0x340 [ 296.394337][T19401] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 296.400154][T19401] ? lock_downgrade+0x920/0x920 [ 296.405013][T19401] ? key_validate+0x100/0x100 [ 296.409706][T19401] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.415947][T19401] ? _copy_from_user+0x12c/0x1a0 [ 296.420916][T19401] __ia32_sys_add_key+0x277/0x4f0 [ 296.425931][T19401] ? __x64_sys_add_key+0x4f0/0x4f0 [ 296.431080][T19401] ? kernel_fpu_begin+0x2f0/0x2f0 [ 296.436108][T19401] ? entry_SYSENTER_compat+0x68/0x7f [ 296.441395][T19401] ? trace_hardirqs_on+0x67/0x240 [ 296.446430][T19401] do_fast_syscall_32+0x27b/0xdb3 [ 296.451520][T19401] entry_SYSENTER_compat+0x70/0x7f [ 296.456631][T19401] RIP: 0023:0xf7f289c9 23:52:02 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2b6d006bb8a27222"], 0x8) [ 296.460705][T19401] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 296.480433][T19401] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 296.488858][T19401] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 296.496913][T19401] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 296.504881][T19401] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 296.504888][T19401] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 296.504893][T19401] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:02 executing program 1 (fault-call:4 fault-nth:3): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:02 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x40) write$ppp(r2, &(0x7f00000001c0)="12836a30e07dff34e7fa25ad02e3c8f2fa8f9f51acc14164090535bf5ff03be08e9d3893abe1e9e4d729562e63b807c58dbb310afcdece52dd8fb7e2173462304d3e92d9abcb61342b6e7c715cb95d6c809f8f29173e69e32e27abe9ff01f93c5c8eaafd92c5c27f39826b286ebae940a832e0a8a78bfc7efcbca9de74229ef255b25cc7300970e536e64b9265296a71c71e4158dc53bcda41311155fd72379311617328e2d5729ecc713a5b260305dc3c97a8951cdacb7e17768fdc3d5653c5b5390445d8051d20dcef70cba4759bf440cc36858e4911befc51703fc860437c0b575d34d1f1233f6f87", 0xea) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2b6d654f6f867920"], 0x7) 23:52:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfffffe00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:02 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:02 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:02 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:02 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2b, 'memory'}]}, 0xff83) 23:52:02 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfeffff00000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 296.778676][T19443] FAULT_INJECTION: forcing a failure. [ 296.778676][T19443] name failslab, interval 1, probability 0, space 0, times 0 [ 296.808829][T19443] CPU: 0 PID: 19443 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 296.816871][T19443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:52:02 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) [ 296.826932][T19443] Call Trace: [ 296.830234][T19443] dump_stack+0x172/0x1f0 [ 296.834583][T19443] should_fail.cold+0xa/0x15 [ 296.839182][T19443] ? fault_create_debugfs_attr+0x180/0x180 [ 296.844996][T19443] ? page_to_nid.part.0+0x20/0x20 [ 296.850032][T19443] ? ___might_sleep+0x163/0x280 [ 296.854888][T19443] __should_failslab+0x121/0x190 [ 296.859836][T19443] should_failslab+0x9/0x14 [ 296.864349][T19443] __kmalloc+0x2e0/0x770 [ 296.868605][T19443] ? refcount_inc_not_zero_checked+0x144/0x200 [ 296.874760][T19443] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 296.880664][T19443] ? security_prepare_creds+0x11d/0x190 [ 296.886206][T19443] security_prepare_creds+0x11d/0x190 [ 296.891571][T19443] prepare_creds+0x32a/0x430 [ 296.891584][T19443] lookup_user_key+0x3f8/0xfb0 [ 296.891597][T19443] ? join_session_keyring+0x340/0x340 [ 296.891611][T19443] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 296.891626][T19443] ? lock_downgrade+0x920/0x920 [ 296.891640][T19443] ? key_validate+0x100/0x100 [ 296.891659][T19443] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 296.891671][T19443] ? _copy_from_user+0x12c/0x1a0 [ 296.891688][T19443] __ia32_sys_add_key+0x277/0x4f0 [ 296.912151][T19443] ? __x64_sys_add_key+0x4f0/0x4f0 [ 296.912172][T19443] do_fast_syscall_32+0x27b/0xdb3 [ 296.912187][T19443] entry_SYSENTER_compat+0x70/0x7f [ 296.912198][T19443] RIP: 0023:0xf7f289c9 [ 296.912211][T19443] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 23:52:02 executing program 1 (fault-call:4 fault-nth:4): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x9000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:02 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x100000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:02 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$tipc(0x1e, 0x7, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f00000001c0)={0x5, 0xfc7, 0x7f, 0x6, [], [], [], 0xd4a, 0x7fff, 0x1, 0x9, "10e5433512d7cc2adb7d802945baa9dc"}) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2bffd6705effe17a"], 0x8) [ 296.912217][T19443] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 296.912227][T19443] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 296.912233][T19443] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 296.912240][T19443] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 296.912252][T19443] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 296.921771][T19443] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x200000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:02 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:02 executing program 0: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:02 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 297.211349][T19478] FAULT_INJECTION: forcing a failure. [ 297.211349][T19478] name failslab, interval 1, probability 0, space 0, times 0 23:52:02 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 297.331440][T19478] CPU: 0 PID: 19478 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 297.339460][T19478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.349514][T19478] Call Trace: [ 297.349538][T19478] dump_stack+0x172/0x1f0 [ 297.349556][T19478] should_fail.cold+0xa/0x15 [ 297.349579][T19478] ? lock_downgrade+0x920/0x920 [ 297.361747][T19478] ? fault_create_debugfs_attr+0x180/0x180 [ 297.361769][T19478] ? page_to_nid.part.0+0x20/0x20 [ 297.377459][T19478] ? ___might_sleep+0x163/0x280 [ 297.382319][T19478] __should_failslab+0x121/0x190 [ 297.387509][T19478] should_failslab+0x9/0x14 [ 297.392017][T19478] kmem_cache_alloc+0x2aa/0x710 [ 297.396903][T19478] ? __kasan_check_read+0x11/0x20 [ 297.401918][T19478] ? do_raw_spin_unlock+0x57/0x270 [ 297.401931][T19478] key_alloc+0x426/0x1110 [ 297.401944][T19478] ? refcount_inc_not_zero_checked+0x144/0x200 [ 297.401959][T19478] ? key_user_put+0x70/0x70 [ 297.401971][T19478] ? refcount_inc_checked+0x2b/0x70 [ 297.401983][T19478] ? apparmor_cred_prepare+0x2c3/0x550 [ 297.401994][T19478] keyring_alloc+0x4d/0xc0 [ 297.402009][T19478] install_process_keyring_to_cred.part.0+0x87/0x100 [ 297.402026][T19478] lookup_user_key+0xc97/0xfb0 [ 297.428820][T19478] ? join_session_keyring+0x340/0x340 [ 297.428836][T19478] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 297.428852][T19478] ? lock_downgrade+0x920/0x920 [ 297.428873][T19478] ? key_validate+0x100/0x100 [ 297.450118][T19478] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.450132][T19478] ? _copy_from_user+0x12c/0x1a0 [ 297.450150][T19478] __ia32_sys_add_key+0x277/0x4f0 [ 297.487569][T19478] ? __x64_sys_add_key+0x4f0/0x4f0 [ 297.492712][T19478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.498960][T19478] ? entry_SYSENTER_compat+0x68/0x7f [ 297.504242][T19478] ? trace_hardirqs_on+0x67/0x240 [ 297.509269][T19478] do_fast_syscall_32+0x27b/0xdb3 [ 297.514301][T19478] entry_SYSENTER_compat+0x70/0x7f [ 297.519402][T19478] RIP: 0023:0xf7f289c9 [ 297.523451][T19478] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 297.543043][T19478] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 297.551431][T19478] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 297.559401][T19478] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 297.567356][T19478] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 23:52:03 executing program 1 (fault-call:4 fault-nth:5): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x300000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x40000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:03 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:03 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000200)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='+mem\t\x00\x00\x00'], 0x8) r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) fsconfig$FSCONFIG_SET_PATH(r2, 0x3, &(0x7f0000000080)=',%md5sum\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c) [ 297.575308][T19478] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 297.584016][T19478] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:03 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:03 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x900000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfffffe00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0d0ad4fa1d3f7fadc07dc75930dc98f08a68d9935b23fc4233c96e312742b2ce2a6e31ffd7d7c01e9e8f979fbe1775c8ae3acea7afa3cd76aa24"], 0x8) [ 297.744886][T19528] FAULT_INJECTION: forcing a failure. [ 297.744886][T19528] name failslab, interval 1, probability 0, space 0, times 0 23:52:03 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) [ 297.838189][T19528] CPU: 0 PID: 19528 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 297.846209][T19528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.856277][T19528] Call Trace: [ 297.859580][T19528] dump_stack+0x172/0x1f0 [ 297.863933][T19528] should_fail.cold+0xa/0x15 [ 297.868548][T19528] ? fault_create_debugfs_attr+0x180/0x180 [ 297.874366][T19528] ? page_to_nid.part.0+0x20/0x20 [ 297.879408][T19528] ? ___might_sleep+0x163/0x280 [ 297.884287][T19528] __should_failslab+0x121/0x190 [ 297.889240][T19528] should_failslab+0x9/0x14 [ 297.893755][T19528] __kmalloc_track_caller+0x2dc/0x760 [ 297.899139][T19528] ? key_alloc+0x483/0x1110 [ 297.903658][T19528] kmemdup+0x27/0x60 [ 297.907597][T19528] key_alloc+0x483/0x1110 [ 297.911933][T19528] ? refcount_inc_not_zero_checked+0x144/0x200 [ 297.918099][T19528] ? key_user_put+0x70/0x70 [ 297.922609][T19528] ? refcount_inc_checked+0x2b/0x70 [ 297.927815][T19528] ? apparmor_cred_prepare+0x2c3/0x550 [ 297.933298][T19528] keyring_alloc+0x4d/0xc0 [ 297.937817][T19528] install_process_keyring_to_cred.part.0+0x87/0x100 [ 297.944515][T19528] lookup_user_key+0xc97/0xfb0 [ 297.949285][T19528] ? join_session_keyring+0x340/0x340 [ 297.949306][T19528] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 297.960454][T19528] ? lock_downgrade+0x920/0x920 [ 297.960469][T19528] ? key_validate+0x100/0x100 [ 297.960487][T19528] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.960499][T19528] ? _copy_from_user+0x12c/0x1a0 [ 297.960512][T19528] __ia32_sys_add_key+0x277/0x4f0 [ 297.960526][T19528] ? __x64_sys_add_key+0x4f0/0x4f0 [ 297.960539][T19528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.960559][T19528] ? entry_SYSENTER_compat+0x68/0x7f [ 297.970065][T19528] ? trace_hardirqs_on+0x67/0x240 [ 297.981196][T19528] do_fast_syscall_32+0x27b/0xdb3 [ 297.981213][T19528] entry_SYSENTER_compat+0x70/0x7f [ 297.981224][T19528] RIP: 0023:0xf7f289c9 23:52:03 executing program 1 (fault-call:4 fault-nth:6): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa00000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:03 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:03 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000000)) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2b722cd261202f637075202b637075202d637075202b6d656d6f727920"], 0x1d) 23:52:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfeffff00000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 297.981237][T19528] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 297.981244][T19528] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 297.981255][T19528] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 297.981263][T19528] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 297.981270][T19528] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 297.981276][T19528] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 23:52:03 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 297.981283][T19528] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4000, 0x0) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f0000000080)=0x9) 23:52:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x100000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f00000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:03 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) [ 298.190947][T19565] FAULT_INJECTION: forcing a failure. [ 298.190947][T19565] name failslab, interval 1, probability 0, space 0, times 0 [ 298.209834][T19565] CPU: 1 PID: 19565 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 298.217859][T19565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.227919][T19565] Call Trace: [ 298.231222][T19565] dump_stack+0x172/0x1f0 [ 298.235570][T19565] should_fail.cold+0xa/0x15 23:52:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4000000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 298.240171][T19565] ? fault_create_debugfs_attr+0x180/0x180 [ 298.245989][T19565] ? page_to_nid.part.0+0x20/0x20 [ 298.251028][T19565] ? ___might_sleep+0x163/0x280 [ 298.255892][T19565] __should_failslab+0x121/0x190 [ 298.260836][T19565] should_failslab+0x9/0x14 [ 298.265343][T19565] kmem_cache_alloc_trace+0x2d3/0x790 [ 298.270728][T19565] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 298.276980][T19565] assoc_array_insert+0xf4/0x2de0 [ 298.282008][T19565] ? mark_held_locks+0xf0/0xf0 [ 298.286781][T19565] ? trace_hardirqs_on_caller+0x6a/0x240 [ 298.292431][T19565] ? lock_acquire+0x190/0x410 [ 298.297113][T19565] ? __key_link_lock+0x51/0xd0 [ 298.301891][T19565] ? assoc_array_cancel_edit+0x90/0x90 [ 298.307348][T19565] ? __kasan_check_write+0x14/0x20 [ 298.312477][T19565] ? down_write+0xdf/0x150 [ 298.316901][T19565] ? __down_timeout+0x2d0/0x2d0 [ 298.321752][T19565] ? key_free_user_ns+0x1f0/0x1f0 [ 298.326780][T19565] __key_link_begin+0xf2/0x250 [ 298.331545][T19565] key_create_or_update+0x3df/0xbe0 [ 298.336750][T19565] ? key_type_lookup+0xf0/0xf0 [ 298.341515][T19565] ? join_session_keyring+0x340/0x340 [ 298.346910][T19565] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.353150][T19565] __ia32_sys_add_key+0x2c2/0x4f0 [ 298.358170][T19565] ? __x64_sys_add_key+0x4f0/0x4f0 [ 298.363293][T19565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.369532][T19565] ? entry_SYSENTER_compat+0x68/0x7f [ 298.369545][T19565] ? trace_hardirqs_on+0x67/0x240 [ 298.369568][T19565] do_fast_syscall_32+0x27b/0xdb3 [ 298.379863][T19565] entry_SYSENTER_compat+0x70/0x7f [ 298.389959][T19565] RIP: 0023:0xf7f289c9 [ 298.394117][T19565] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 298.413721][T19565] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 298.422139][T19565] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 298.430114][T19565] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 298.438087][T19565] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 298.446055][T19565] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 298.454015][T19565] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:04 executing program 1 (fault-call:4 fault-nth:7): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:04 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x200001ca, 0xfffffffffffffffe) 23:52:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x200000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:04 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0xffd5) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685, &(0x7f0000000340)={0x1, 0xa8db, 0x1000, 0xff, &(0x7f00000001c0)="2b4722c7f4986a9a2a34517f0c4f2ec448780fc33f9fcdaf7abff0429eb27c40877c7bef17e153d2dd0ae99ce9ca8fb2b7335e7b2d9a8ad6fcb639af991a9e9d1f8ad075a48752aac22773b23f8c8fc800274dd55ff2d6946e1813d566a706a5ca6afe915155bc423bf25be47b3b462c9b0170b13b4e6cebd2ff50f9f1efe0f853dfc6e2509427c3b59b7177c5a55f6dded884be1ea1ddb7a29ad4b8f706222d5a04c811b2cff0f31e42ca5cddf4f16fd286a0b52a15e2ea5be6ba563d4485a8ad6d42e5c5a01520b3fb6a8e3175415f7cf9bd38669b7f9353fabe4076343546a68aaaae46aa6820a2cd276dbb39ca7fa2a449da610645eeb0d9f41980655b", 0x58, 0x0, &(0x7f00000002c0)="d7476743628ccf40080cdd250602d6ec65c0568b3728b1a0fcffbadaf7de6815eeb9e73e2f5f9e85dcd1b371c3d753906631f95332812b0c80141e8fdad155f608ad66c4e9d6848ce21b9de0fdd541aac6014d14f72929d8"}) socketpair(0xf, 0x6, 0x20, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000100)={r3, 0x8, 0x9, "921c9560a9b67e2e1a780eaf702d5d4793645242ec210a124facff3a5f5c9c30486bcecbd1d8bcc0ed67dc6de1f893a40837926abfbd2688a303f0fb1630a5ed388680d8bbf1d90162b474c4f68f836b327b62555fb165cf6262259c"}) 23:52:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x300000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:04 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6577206465666100040000000000003a73797a20303030303030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 298.622716][T19608] FAULT_INJECTION: forcing a failure. [ 298.622716][T19608] name failslab, interval 1, probability 0, space 0, times 0 23:52:04 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:04 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x301000, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$PPPOEIOCSFWD(r0, 0x4004b100, &(0x7f0000000200)={0x18, 0x0, {0xffffffffffffffff, @empty, 'ip_vti0\x00'}}) syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x3, 0x80000) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() lstat(&(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)) setregid(r3, r4) 23:52:04 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) [ 298.666177][T19608] CPU: 1 PID: 19608 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 298.674200][T19608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.684345][T19608] Call Trace: [ 298.687650][T19608] dump_stack+0x172/0x1f0 [ 298.691996][T19608] should_fail.cold+0xa/0x15 [ 298.696599][T19608] ? fault_create_debugfs_attr+0x180/0x180 [ 298.702426][T19608] ? page_to_nid.part.0+0x20/0x20 [ 298.707468][T19608] ? ___might_sleep+0x163/0x280 [ 298.712331][T19608] __should_failslab+0x121/0x190 [ 298.717299][T19608] should_failslab+0x9/0x14 [ 298.721839][T19608] kmem_cache_alloc_trace+0x2d3/0x790 [ 298.722334][T19620] encrypted_key: master key parameter 'defa' is invalid [ 298.727211][T19608] ? __sanitizer_cov_trace_switch+0x13/0x80 [ 298.727230][T19608] assoc_array_insert+0x79e/0x2de0 [ 298.727245][T19608] ? mark_held_locks+0xf0/0xf0 [ 298.727268][T19608] ? key_instantiate_and_link+0x393/0x4b0 [ 298.755623][T19608] ? _raw_spin_unlock+0x2d/0x50 [ 298.755687][T19623] encrypted_key: master key parameter 'defa' is invalid [ 298.760467][T19608] ? retint_kernel+0x2b/0x2b [ 298.760481][T19608] ? trace_hardirqs_on_caller+0x6a/0x240 [ 298.760498][T19608] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 298.760515][T19608] ? assoc_array_cancel_edit+0x90/0x90 [ 298.760531][T19608] ? retint_kernel+0x2b/0x2b [ 298.793143][T19608] __key_link_begin+0xf2/0x250 [ 298.797918][T19608] key_create_or_update+0x3df/0xbe0 [ 298.803128][T19608] ? key_type_lookup+0xf0/0xf0 [ 298.807903][T19608] ? join_session_keyring+0x340/0x340 [ 298.813301][T19608] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.819549][T19608] __ia32_sys_add_key+0x2c2/0x4f0 [ 298.824601][T19608] ? __x64_sys_add_key+0x4f0/0x4f0 [ 298.829702][T19608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.829716][T19608] ? entry_SYSENTER_compat+0x68/0x7f [ 298.829728][T19608] ? trace_hardirqs_on+0x67/0x240 [ 298.829744][T19608] do_fast_syscall_32+0x27b/0xdb3 [ 298.829756][T19608] entry_SYSENTER_compat+0x70/0x7f [ 298.829766][T19608] RIP: 0023:0xf7f289c9 [ 298.829783][T19608] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 298.851287][T19608] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 298.860449][T19608] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 298.860458][T19608] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 298.860466][T19608] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 23:52:04 executing program 1 (fault-call:4 fault-nth:8): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:04 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:04 executing program 4: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) waitid(0x1, r0, &(0x7f0000000040), 0xa0000001, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:04 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:04 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FBUF(r0, 0x802c560a, &(0x7f0000000080)={0x81, 0x10, &(0x7f00000001c0)="327f0be5cab90100e60ba97214ba81b2b0da6dcd387385516aeb707af4f78ffe2e948028f7feed1c0bae8f12b8006d92d5011c8f6ba25ea5712519ba92b5fe3741a015d4e9746e74a51eb7277385ba240bdcc80f37676994dddecb51780f66fad522c8e0291d6372ba99b7ae225d7a58d437e6c25b6740d284d0a219eb13ae092086926b2b78aca7485ecc65cc6d6c5d50c03e3d9fbf95cc72595d00a9a80be23e4ec0c908c46d9c79c4a162e462d24ef0af17d57d694edfba4fa726eb32d93fae23ad86000d3b4c48f21859f1ad4dae043f6e8daadd718e7e3cc377c5be47b6b7b6fdf2fd7ee6b08fde21ac6094", {0x2, 0x6, 0x64737664, 0x6, 0x1, 0x9, 0x5, 0x4}}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) socket$unix(0x1, 0x5, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB='+memo>y '], 0x8) 23:52:04 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) [ 298.860471][T19608] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 298.860478][T19608] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 298.929779][T19621] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x900000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:04 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x5, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x400) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000040)) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 23:52:04 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:04 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/psched\x00') ioctl$PPPIOCSPASS(r1, 0x40087447, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x1e, 0x1ffc000000, 0x0, 0x2}, {0xbfaf, 0x5be9, 0x9, 0x9}, {0x7a, 0x2, 0x400, 0x10000}]}) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0x128) [ 299.056109][T19640] FAULT_INJECTION: forcing a failure. [ 299.056109][T19640] name failslab, interval 1, probability 0, space 0, times 0 23:52:04 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) [ 299.127032][T19640] CPU: 1 PID: 19640 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 299.135052][T19640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.145116][T19640] Call Trace: [ 299.148445][T19640] dump_stack+0x172/0x1f0 [ 299.152792][T19640] should_fail.cold+0xa/0x15 [ 299.157394][T19640] ? lock_downgrade+0x920/0x920 [ 299.162256][T19640] ? fault_create_debugfs_attr+0x180/0x180 [ 299.168073][T19640] ? page_to_nid.part.0+0x20/0x20 [ 299.173102][T19640] ? ___might_sleep+0x163/0x280 [ 299.177960][T19640] __should_failslab+0x121/0x190 [ 299.182916][T19640] should_failslab+0x9/0x14 [ 299.187509][T19640] kmem_cache_alloc+0x2aa/0x710 [ 299.192364][T19640] ? __kasan_check_read+0x11/0x20 [ 299.197564][T19640] ? do_raw_spin_unlock+0x57/0x270 [ 299.202676][T19640] key_alloc+0x426/0x1110 [ 299.207008][T19640] ? key_user_put+0x70/0x70 [ 299.211521][T19640] key_create_or_update+0x651/0xbe0 [ 299.216728][T19640] ? key_type_lookup+0xf0/0xf0 [ 299.221501][T19640] ? join_session_keyring+0x340/0x340 23:52:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x400c744d) [ 299.226887][T19640] ? copy_user_enhanced_fast_string+0xe/0x20 [ 299.232875][T19640] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.239119][T19640] __ia32_sys_add_key+0x2c2/0x4f0 [ 299.244149][T19640] ? __x64_sys_add_key+0x4f0/0x4f0 [ 299.249271][T19640] ? entry_SYSENTER_compat+0x68/0x7f [ 299.254562][T19640] ? trace_hardirqs_on+0x67/0x240 [ 299.259600][T19640] do_fast_syscall_32+0x27b/0xdb3 [ 299.264637][T19640] entry_SYSENTER_compat+0x70/0x7f [ 299.269758][T19640] RIP: 0023:0xf7f289c9 [ 299.273838][T19640] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 299.288146][T19667] Unknown ioctl 1074558029 [ 299.293441][T19640] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 299.293455][T19640] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 299.293462][T19640] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 299.293478][T19640] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 299.314534][T19668] Unknown ioctl 1074558029 [ 299.322198][T19640] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 299.322205][T19640] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:05 executing program 1 (fault-call:4 fault-nth:9): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:05 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xde, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000140)={r3, 0x3}) 23:52:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa00000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:05 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = shmget(0x3, 0x2000, 0x202, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000300)=""/30) r1 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)="5ffc857ed8eaed3b61b34b673718969be8145b1a9b87ca30b3bc87938f1051bf24c259563f6b952d214532341de3fce998f59df8aebad66fe8b439e5c2bbdffe14958ebae9d35dfafaed964ba305c5d1b37244ac18f9fd813c3f7e18b5b50c48831c0680efad0999e5bba4bcf60f2b94455d5690ec4ad102abccc4d6feb7a77fcdbabd9096ec24a0451dccac58dab0574780564368bf14a81cdd74ebefb94fc27f04d6c3f1bd21808c3b0ec76b1c740b8d2a25e9c10691cb1e01aa2e05013519d6ae782c50b1efb96dc18bce0e610608fef8d9a8bfb8d842ea63e22185b56ccab0ac", 0xe2, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)="65caa9e8c6bfc6bf8283a9a2d5176ce5609874d12d4c53d0195e903b447a324d51e748970f0f6f511c58180045f4443fb18a6f11cf57c8f1938a60645a3326dcff36256dbe01721a71a7cf34a412a3547757f2873a22465f37e7d2c11e12413d5f28950691654268bac7934a040cf27d5d948856c7cbcea4240397a024871fa693bf4ba0ecd2d2d608b2440151090f2c6107f5f027b301e58c2aca", 0x9b, r1) 23:52:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x10401, 0x48) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000280)={@rand_addr, @loopback, 0x0}, &(0x7f00000002c0)=0xc) r4 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast2, @in6=@remote, 0x4e20, 0xd84, 0x4e23, 0xe79, 0xa, 0x80, 0xa0, 0x3b, r3, r4}, {0x2, 0x5, 0x3, 0x5, 0x2000000, 0x7, 0xed08, 0x4}, {0x3, 0x6, 0x4d, 0xff}, 0x1, 0x6e6bb0, 0x3, 0x1, 0x2, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4d6}, 0x722264e48e83b658, @in=@local, 0x3506, 0x2, 0x3, 0x5, 0x4, 0x2, 0x4}}, 0xe8) 23:52:05 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:05 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f00000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000040)={0x4, 0x4c0}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 299.615240][T19687] FAULT_INJECTION: forcing a failure. [ 299.615240][T19687] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 299.628476][T19687] CPU: 1 PID: 19687 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 299.636545][T19687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.646713][T19687] Call Trace: [ 299.650052][T19687] dump_stack+0x172/0x1f0 [ 299.654395][T19687] should_fail.cold+0xa/0x15 [ 299.658996][T19687] ? fault_create_debugfs_attr+0x180/0x180 23:52:05 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) [ 299.661302][T19703] Unknown ioctl -1072667636 [ 299.664810][T19687] ? __this_cpu_preempt_check+0x3a/0x210 [ 299.664829][T19687] should_fail_alloc_page+0x50/0x60 [ 299.664846][T19687] __alloc_pages_nodemask+0x1a1/0x8f0 [ 299.686038][T19687] ? __alloc_pages_slowpath+0x2520/0x2520 [ 299.691769][T19687] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 299.692079][T19703] Unknown ioctl -1072667636 [ 299.697409][T19687] ? __kasan_check_read+0x11/0x20 [ 299.697428][T19687] ? fault_create_debugfs_attr+0x180/0x180 [ 299.697452][T19687] cache_grow_begin+0x90/0xd20 [ 299.717506][T19687] ? key_alloc+0x426/0x1110 [ 299.722020][T19687] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.728265][T19687] kmem_cache_alloc+0x64e/0x710 [ 299.733121][T19687] ? __kasan_check_read+0x11/0x20 [ 299.738168][T19687] key_alloc+0x426/0x1110 [ 299.742504][T19687] ? key_user_put+0x70/0x70 [ 299.747017][T19687] key_create_or_update+0x651/0xbe0 [ 299.752217][T19687] ? key_type_lookup+0xf0/0xf0 [ 299.756988][T19687] ? join_session_keyring+0x340/0x340 [ 299.762384][T19687] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.768637][T19687] __ia32_sys_add_key+0x2c2/0x4f0 [ 299.773670][T19687] ? __x64_sys_add_key+0x4f0/0x4f0 [ 299.778796][T19687] ? do_fast_syscall_32+0x241/0xdb3 [ 299.784019][T19687] do_fast_syscall_32+0x27b/0xdb3 [ 299.789048][T19687] entry_SYSENTER_compat+0x70/0x7f [ 299.794163][T19687] RIP: 0023:0xf7f289c9 [ 299.798234][T19687] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 299.817839][T19687] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 299.826250][T19687] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 299.834213][T19687] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 299.834219][T19687] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 299.834225][T19687] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 23:52:05 executing program 1 (fault-call:4 fault-nth:10): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:05 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}, 0x2b, 0x6, 0x6, 0x929b, 0x80}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r2, 0x4, 0xffffffff00000000}, 0xc) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4000000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./Ngro\xb7\x17.ne\x9a/\b\x00z0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="60fd9b514e1fa26a9613a162b5ac25c76156a9745a5f085b7212b68a3692ed8ad9829ba1837f"], 0x3) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'rose0\x00', 0x5a00}) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80585414, &(0x7f0000000100)=""/123) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000240)=0x54) 23:52:05 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 299.834230][T19687] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 000p0000000000004096\x00'], 0xfffffffffffffc48, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x400c744d) add_key(&(0x7f0000000240)='encrypted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) write$FUSE_POLL(r0, &(0x7f00000001c0)={0x5, 0x0, 0xb, {0x8}}, 0x18) r1 = syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x0, 0x400) openat$cgroup_ro(r1, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000000)=""/253, 0xfd) 23:52:05 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x200001ca, 0xfffffffffffffffe) 23:52:05 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:05 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000080), &(0x7f0000000100)=0x4) openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) socket$key(0xf, 0x3, 0x2) [ 299.973064][T19724] FAULT_INJECTION: forcing a failure. [ 299.973064][T19724] name failslab, interval 1, probability 0, space 0, times 0 23:52:05 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 300.044444][T19724] CPU: 1 PID: 19724 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 300.052590][T19724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.062653][T19724] Call Trace: [ 300.065957][T19724] dump_stack+0x172/0x1f0 [ 300.070302][T19724] should_fail.cold+0xa/0x15 [ 300.074892][T19724] ? fault_create_debugfs_attr+0x180/0x180 [ 300.080688][T19724] ? page_to_nid.part.0+0x20/0x20 [ 300.080702][T19724] ? ___might_sleep+0x163/0x280 [ 300.080717][T19724] __should_failslab+0x121/0x190 [ 300.080737][T19724] should_failslab+0x9/0x14 [ 300.099994][T19724] __kmalloc+0x2e0/0x770 [ 300.104249][T19724] ? lock_acquire+0x190/0x410 [ 300.108931][T19724] ? __key_instantiate_and_link+0x3c/0x3e0 [ 300.114743][T19724] ? encrypted_instantiate+0x157/0x947 [ 300.120213][T19724] encrypted_instantiate+0x157/0x947 [ 300.125508][T19724] ? __mutex_lock+0x45d/0x13c0 [ 300.130290][T19724] ? datablob_hmac_verify+0x310/0x310 [ 300.135667][T19724] ? key_alloc+0x901/0x1110 [ 300.140182][T19724] ? mutex_lock_io_nested+0x1260/0x1260 [ 300.145745][T19724] ? _raw_spin_unlock+0x2d/0x50 [ 300.150607][T19724] ? key_alloc+0xaa6/0x1110 [ 300.155133][T19724] __key_instantiate_and_link+0xd2/0x3e0 [ 300.160812][T19724] key_create_or_update+0x68e/0xbe0 [ 300.166023][T19724] ? key_type_lookup+0xf0/0xf0 [ 300.170805][T19724] ? join_session_keyring+0x340/0x340 [ 300.176208][T19724] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.182462][T19724] __ia32_sys_add_key+0x2c2/0x4f0 [ 300.187504][T19724] ? __x64_sys_add_key+0x4f0/0x4f0 [ 300.192639][T19724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.198892][T19724] ? entry_SYSENTER_compat+0x68/0x7f [ 300.204188][T19724] ? trace_hardirqs_on+0x67/0x240 [ 300.209231][T19724] do_fast_syscall_32+0x27b/0xdb3 [ 300.214309][T19724] entry_SYSENTER_compat+0x70/0x7f [ 300.219429][T19724] RIP: 0023:0xf7f289c9 [ 300.223503][T19724] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 300.243108][T19724] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 300.251535][T19724] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 300.259516][T19724] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 300.267499][T19724] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 300.275479][T19724] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 300.283457][T19724] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:05 executing program 1 (fault-call:4 fault-nth:11): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:05 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:05 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a3030343039360093fb8c6b6780b52df627c17c926c51716914d85dc089a6751e6faf4b5ce6cdb8c1c470cb9335e896fd41d485d2abdbb6ea3c75f63cb7952da68214ec993a892e36964fffe57662c38eef8921f187162ce0065efb2530ff32db7618a7078688abd4a9bd1200f657503cc8931e709f33ec6b30c6d733797ce22ef115d5b3d553cf1e462511b8a48f3f98ec74b8d57164874840fbb9a93aa0a955f525668a43a2dcca024f164321f832e9c14b5707f705bd1cf0e9684ad20a6c00"/226], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x4100, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x5}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000300)={r1, @in6={{0xa, 0x4e22, 0x3, @loopback, 0x1}}}, 0x84) 23:52:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x36f, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r0, 0x14, 0x3}, 0x14) keyctl$instantiate(0xc, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e657420757365401b73797a203030303030303039360000000000000000080000000000000000000000d28af69c29232a445cf320b6dca6dee4127672fbba30893cc946"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 23:52:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80001, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40047705, &(0x7f0000000080)={0x0, 0x80}) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f00000001c0)={0xfffffffffffffa99, 0x0, 0x481a, 0x0, 0x0, [], [], [], 0xfffffffffffffff9, 0x7a09}) [ 300.345289][T19757] encrypted_key: insufficient parameters specified 23:52:06 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:06 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 300.434946][T19763] encrypted_key: insufficient parameters specified [ 300.491067][T19761] FAULT_INJECTION: forcing a failure. [ 300.491067][T19761] name failslab, interval 1, probability 0, space 0, times 0 [ 300.520447][T19761] CPU: 0 PID: 19761 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #80 [ 300.528467][T19761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.538526][T19761] Call Trace: [ 300.541828][T19761] dump_stack+0x172/0x1f0 [ 300.546532][T19761] should_fail.cold+0xa/0x15 [ 300.551142][T19761] ? fault_create_debugfs_attr+0x180/0x180 [ 300.556967][T19761] ? page_to_nid.part.0+0x20/0x20 [ 300.561982][T19761] ? ___might_sleep+0x163/0x280 [ 300.566817][T19761] __should_failslab+0x121/0x190 [ 300.571740][T19761] should_failslab+0x9/0x14 [ 300.576320][T19761] __kmalloc+0x2e0/0x770 [ 300.580546][T19761] ? _raw_spin_unlock+0x2d/0x50 [ 300.585377][T19761] ? key_payload_reserve+0xa8/0x440 [ 300.590559][T19761] ? encrypted_key_alloc+0x218/0x430 [ 300.595851][T19761] encrypted_key_alloc+0x218/0x430 [ 300.600963][T19761] ? init_skcipher_req.constprop.0+0x1d0/0x1d0 [ 300.607098][T19761] ? lock_acquire+0x190/0x410 [ 300.611762][T19761] encrypted_instantiate+0x22e/0x947 [ 300.617030][T19761] ? __mutex_lock+0x45d/0x13c0 [ 300.621779][T19761] ? datablob_hmac_verify+0x310/0x310 [ 300.627131][T19761] ? key_alloc+0x901/0x1110 [ 300.631625][T19761] ? mutex_lock_io_nested+0x1260/0x1260 [ 300.637154][T19761] ? _raw_spin_unlock+0x2d/0x50 [ 300.641983][T19761] ? key_alloc+0xaa6/0x1110 [ 300.646472][T19761] __key_instantiate_and_link+0xd2/0x3e0 [ 300.652098][T19761] key_create_or_update+0x68e/0xbe0 [ 300.657282][T19761] ? key_type_lookup+0xf0/0xf0 [ 300.662025][T19761] ? join_session_keyring+0x340/0x340 [ 300.667477][T19761] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 300.673710][T19761] __ia32_sys_add_key+0x2c2/0x4f0 [ 300.678726][T19761] ? __x64_sys_add_key+0x4f0/0x4f0 [ 300.683825][T19761] ? entry_SYSENTER_compat+0x68/0x7f [ 300.689096][T19761] ? trace_hardirqs_on+0x67/0x240 [ 300.694115][T19761] do_fast_syscall_32+0x27b/0xdb3 [ 300.699129][T19761] entry_SYSENTER_compat+0x70/0x7f [ 300.704221][T19761] RIP: 0023:0xf7f289c9 [ 300.708272][T19761] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 300.727865][T19761] RSP: 002b:00000000f5d240cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e 23:52:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e658d9915566661756c7420757365723a73797a20303030303030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000040)={0x0, 0x12, 0x2, @tid=r1}, &(0x7f0000000080)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 300.736263][T19761] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 300.744221][T19761] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 300.752176][T19761] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 300.760129][T19761] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 300.768097][T19761] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2bffffffff3683a6"], 0x8) 23:52:06 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:06 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:06 executing program 1 (fault-call:4 fault-nth:12): pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 300.844305][T19781] encrypted_key: keyword 'neŤ™Vfault' not recognized 23:52:06 executing program 0: getcwd(&(0x7f0000001140)=""/247, 0xa7c14aa8) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="0756d9445f49926396a5592c9f67617e93dc5abcc56545e2636368f6b3f957ecbc1864a68a63ed73e410acc52f334dceb33132dd833d58e7acb51d82d02acf3272225a8829bdf75487361bf948c5a2bf8ce12780ca744c9481943bb7ea8c3dd495507056ba597a1e28d51d6a483241c61fd42a93070567a4dd02033fc9539fe46136d8a1e2a5456300e3ce886e19b00a39246b809b279965c2a1965e0a97ce11fa69fdd40cab7ecf", 0xa8}], 0x1, &(0x7f0000000800)=[@op={0x10}, @assoc={0x10, 0x117, 0x4, 0x7}, @iv={0xac, 0x117, 0x2, 0x9a, "7439dd5df9576d69024ad4e3d12a740da1455971b5ad0317b85a897cfc70d68ca48126ddeb3280db1d09d0268f7b75b25e4b39723ba9df474caef205395637855a693e769b5ad76a172247608409e20d97394b32244199dade601e4f7b3c13e78f2ebb57281389459946a5612470fa67c1a19f05e354edabeb614dcdfba96e12fb4ed6a4ce62dabfb6ab74cfa9e2b39d5683fd043c243ac0e3d4"}, @assoc={0x10, 0x117, 0x4, 0xffffffffffff9510}, @op={0x10}, @iv={0x28, 0x117, 0x2, 0x16, "17ba6e544dce302317badf98aeeeaf2514b370b0abd3"}], 0x114, 0x804}, {0x0, 0x0, &(0x7f0000000740)=[{&(0x7f00000004c0)="d46c942aad487763d9ceca0df34a43bfba759aaf713992c9cc4ae32e30dec295aad72bf4ca059b648c2faf2e0eb139f2f106f8ed284559faecf1d715b8346969a67463f2f2b42c6942adfd7006e68224210057e5e2931bf326c1cd099540261a58bcf52bb46e5b95fac2de220f6b916e201342a6c76c01c62695b23d9b2b9d2ef77935f0f212acbb0a7283a241140dcf6151c07b72fc35af8043491b58e63e63194882357e7f8cec4937e5f9bfc940487695a9a18eac53c33fa37b4aded8d7238cd796707d09a7131746dcfee6", 0xcd}, {&(0x7f0000000a00)="c4", 0x1}, {&(0x7f00000005c0)="0176b4774f7d09dae2c839ad1936504055b5f3572830e26221cc91d1d3dc1fb437b132981acbb337856a0714cc9f175d248fe3c0090364327d65c6feaa58aaed1259fe94e5a9f99a40666c9d47e3329204f96faec3151085eebdc0e916744b77894c9ad61b76", 0x66}, {&(0x7f0000000140)="a302", 0x2}, {&(0x7f0000000940)="60720c501b7665342418dbd70994fdad7aca97cfb72fa90b009d55681d5bc503a69d48e277e97c94db7d14ce65919bf4e38f917710f1f3055aac330ad48f422dbec07514e4f545ba2033dfd15124bd863cd0642bef09b462e0eda58be8f1a08cc6ce1db755a7652d4660d4b370bb5f8a1e0ed900a56ad87bb8c117c99966d8f10b5bffdae6c6ffe883c3978dcadd5ce30f1ccbe6471dae721d461508c9ce86cef382fd3ac2e79c9016e3b843", 0xac}, {&(0x7f0000000700)="564a37cf84714b7f3cba28fc6871f2f643d78676d951377c6eb85f22e6b8d40f750d29587266878e6c", 0x29}], 0x6, &(0x7f0000000780)=[@op={0x10, 0x117, 0x3, 0x1}, @op={0x10, 0x117, 0x3, 0x1}, @assoc={0x10, 0x117, 0x4, 0x8}], 0x30, 0x10}], 0x2, 0x20000000) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) accept4$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x80000) r4 = getuid() setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @empty}, @in6=@mcast1, 0x4e22, 0x9, 0x4e23, 0x0, 0xa, 0xa0, 0x80, 0x62, r3, r4}, {0x4, 0x7, 0x1ff, 0x7ff, 0x6, 0x401, 0x0, 0x8}, {0x5, 0x5, 0x7ff, 0xd34a744}, 0x8, 0x6e6bb7, 0x0, 0x1, 0x3, 0x2}, {{@in, 0x80000001, 0xff}, 0x2, @in=@local, 0x0, 0x1, 0x3, 0x5, 0x10000, 0x2, 0xa56}}, 0xe8) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) [ 300.909837][T19788] encrypted_key: keyword 'neŤ™Vfault' not recognized 23:52:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x2, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x2, {0x5}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000080)=@gcm_256={{0x304}, "c941906f261635b8", "ceeb571f3e5dbcc146e412b96b9b315f20fe56df4253baf12220dc96bb4140ac", "c6db9693", "18c7582c825b8a8a"}, 0x38) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303030303030303030303030303030303430393600cf99f92a5c1b69780b56e6486fe12b088c802fc54a556e1d7df3a6f1f97123cf9925b515e7200b6d465d27e7daa68371be0665e899f4c34c679cfdcf4f2f62d7e9f54da5d9f32eedf57b505672e6ba26b70fa6b39850fc881aca49211e255451b25bbd66b6b36f9af076ed6a198a85017b91f00285655a23f29df2883814"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) sendto$inet(r0, &(0x7f0000000240)="218b221d326f0f20a9edf6e340afbd23a4761c3fc719f86dc5bf0e4042d559e7d83b2fe008eaf251dfc768b8838875b1462e02fe5bd7e6e7cd3d3a62c439e9f93c6b4a2ab411aa5257aeef96f90accca74ed0a3ad9625773a2622b3f8515fcb6d77c991e291e80391bf4e5d7fffe5f16b49786bd839c4c240db67924ca863ee531", 0x81, 0x84, 0x0, 0x0) 23:52:06 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='.cpu/\x00\xb8\x7f\x14\x9a\'\x8ci\xbd[\xe3GK\x8c\'\x88\xa5W\x8e9\x00\x00\x00\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x280000, 0x0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x200, 0x6) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:06 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:06 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:06 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 301.109157][T19803] encrypted_key: insufficient parameters specified 23:52:06 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:06 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) [ 301.168009][T19815] encrypted_key: insufficient parameters specified 23:52:06 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:06 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='.ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 301.221564][T19820] encrypted_key: insufficient parameters specified 23:52:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='new default user:syz 0000000000\f0000004096\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:07 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:07 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:07 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypt.d\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) socketpair(0x1, 0x80805, 0x2, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000280)={r2, 0x3}) [ 301.373329][T19836] encrypted_key: insufficient parameters specified 23:52:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000100)='securityppp0ppp0ppp0-\x00', 0xffffffffffffffff}, 0x30) fcntl$setown(r0, 0x8, r1) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xffffffff, 0x400241) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2b0000000007000000000000007920af35128c1f179df564ff4d4d842b6be093f202466ae8d6777400cf01f447cd10ecbe09000000544edfc976c753d7c0b16b96381d5787d44f0d220f17f530a60a78742729482bd9eec13fd0c7ceb50220"], 0x8) [ 301.430717][T19841] encrypted_key: insufficient parameters specified 23:52:07 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:07 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:07 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) ptrace$getsig(0x4202, r2, 0x4, &(0x7f0000000100)) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="3e1b70e4c1f62e8b"], 0x8) 23:52:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002a80)=0x0) r2 = add_key(&(0x7f0000002b00)='cifs.idmap\x00', &(0x7f0000002b40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r3 = add_key(&(0x7f0000002b80)='cifs.spnego\x00', &(0x7f0000002bc0)={'syz', 0x1}, &(0x7f0000002c00)="d32600659b14cd549cdad4594f4f541fcd01baa20932586ad776a472123a9aba8a2ba2ce3c54abb249a8a8e0855e2011cc7951991c04afaf2e317698ec7e187e76cd6518d6166f0f975c419a0f1c85547922ca6d03fda8b2b70fba74f9cf9f668f3cc74e447c4f4642612e1a755d2bedfd0f37d2704e95da397764e5f2a12ab0235f410200f3da37b0bb879a64ccf53bba119e21f6b2437844", 0x99, 0xffffffffffffffff) r4 = add_key(&(0x7f0000002cc0)='rxrpc\x00', &(0x7f0000002d00)={'syz', 0x1}, &(0x7f0000002d40)="5a5d30869effe70155852ba5ae92cc996039bbd0684ca64213b2491802a23217b5f0a8b9486a6b4ba5071d789776837d6d6e46089dccbbdd1347ca4d8cf500946c4416a64a90da2079d8c2dd6bc0e47fb825bbcc4515d1545fe10a021f95fc99776ac7f8b7063cf57153c65522558393eb867a1056b21a3cdad2", 0x7a, 0xfffffffffffffff9) keyctl$dh_compute(0x17, &(0x7f0000002dc0)={r2, r3, r4}, &(0x7f0000002e00)=""/160, 0xa0, &(0x7f0000002fc0)={&(0x7f0000002ec0)={'md5-generic\x00'}, &(0x7f0000002f00)="6285179e0138a63797456a134a96c9f776069467423413ea64367b55ce011e366b2cdd03d65e5e863149709da9b156e72ccc46df02068569411c64e72d3675dae97f3c2100dafd5e6193b188445ae45cbe683782ea2e1283ee03a6985c3de8ba41183f69933bd7320ab44ebad475fdd77731b90419eafa81db2d2a84c48644df9fe9e400d2495b85645abd3747b0a64ca50dbfd6e42d3ac42e51356bfc54a49c47961d443a71653f", 0xa8}) syz_open_procfs$namespace(r1, &(0x7f0000002ac0)='ns/mnt\x00') keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r5 = syz_open_dev$usb(&(0x7f0000003000)='/dev/bus/usb/00#/00#\x00', 0x2, 0x80) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000003040)=@assoc_value={0x0, 0x10001}, &(0x7f0000003080)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f00000030c0)={r6, 0x10001, 0x10, 0x7, 0x3}, &(0x7f0000003100)=0x18) r7 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) fstat(r0, &(0x7f0000002740)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f00000027c0)=0xc) ioctl$RTC_PIE_ON(r5, 0x7005) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002840)={0x0, r0, 0x0, 0x3, &(0x7f0000002800)='syz', 0xffffffffffffffff}, 0x30) stat(&(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000002940)='./file0\x00', &(0x7f0000002980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000002a40)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff}, 0xc, &(0x7f0000000040)=[{&(0x7f00000001c0)={0x220, 0x15, 0x200, 0x70bd27, 0x25dfdbfd, "", [@nested={0xf4, 0x0, [@typed={0xc, 0x70, @u64=0xfffffffffffffff8}, @generic="d33a83eed89132cd4405473a976d30a577104e7269f869cb", @generic="a50d4c38e2a997a841f37ccdd360f37fcbc5f52c377883caa4e1570fc50f7941b69c7a0852fe12c4229fbde5904ba741e880685f2a8eb04327f613691ec2a1b7fa0b9b453a0d5fc1d1ebaf9e477a82406f557c921c8ff8e44b56501127168fe08697cb833164cf80a09dd3e624f5f7171b4ba3eb7fc53f9cc46af9d4a2132151d9650b5a35c98a49b06ab2692422b29bc6e350ebb3783a095139a00f60f80f48b59658df813d0ddd2ecf3f3478d541dfeb131125ec2fe078aea83a19e37523fc9f1964b10dd57e6ff75a"]}, @typed={0xc, 0x95, @binary="ddaa93d34ac7"}, @nested={0x20, 0x47, [@typed={0x8, 0x6b, @pid=r7}, @typed={0x8, 0x5b, @u32}, @typed={0xc, 0x8b, @u64=0x7}]}, @generic="dd179e666a9b653193cd60ef6a71388c82f755fdc4a942533904f1", @generic="e9e1e4d82b3169e36e0f92f31c073a33810a6b0966e2d064089dec49f8e7c89dda5401ed882251d4bdfcb181ef1d67d9a9e306d5f77786dc29cba72446e9f493c4fabd4a1a836ba5bd24a70dd3281a28cfb7782e7aa2f7947467b4db49d015038b8bdb4daf6e6eef77dd0e48331604f053b46cf99a20d5819419af20d3d426d31bf9583e5419a77da8f0b7bbb0a18e71fe54d0da1ab0120540280e5f4276b935b5f13686acf5522706d90b8aa6e9d64c1073d31a9219e54a146eb05840c2765c7e1ed3e6299c9cceaa9b", @typed={0x8, 0x95, @ipv4=@loopback}]}, 0x220}, {&(0x7f0000000400)={0x2224, 0x1a, 0x622, 0x70bd25, 0x25dfdbfb, "", [@nested={0x20a4, 0x64, [@generic="09c86009895b1592c1a9c086c1e8d35da8aa9acb1fe9fb424a16e2f5996d01", @typed={0x8, 0x3, @u32=0x6}, @typed={0xc, 0x21, @u64=0x75}, @generic="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", @generic="1f4c942ec0082ea0232d7214353aa2932299", @generic="8a70b4be7e65beb0c37fae52f936f3ec2267eb171b3643558e01a22d44e311e33be4611fb165b8a24a04d01b744939132ff583bb2f02", @typed={0x10, 0x42, @str='security}}\x00'}, @typed={0x1004, 0x46, @binary="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"}, @typed={0x8, 0x8f, @u32=0x7f}, @typed={0x8, 0x94, @u32=0x8}]}, @generic="1b39071daf7d89bad188bdbb3e3e52d1226eaa82221b67bba7246d904c1c6a7a649b37591b678028f8c87334d902a5658cbdc65829c9aa8ddb1ecb91da932122423472f87ff7759fe1dcbccd16ef6785b4b2626e251eb60ba8dc5d2aa76c9bd441494dfb9bf0fa154c49b31192a5acdd73cd7106d9f4675bdef550d12f617d16eabeb2a8", @generic="87b8c1ad106e34201bc3290d675bafbf856be01a4d3167fda11571717aa6de4109d976271a70a5713d65212f42a61e0e47bbcd220c8edd2596f3b752d05826611490cee734d07a8214517cdef96eb7cd72f70fb78eccedad91c94b54a09ef23137982e9fff651b067f9d96f88f24b70982b586caa65d02b928efff73c2fcce60d1661fcd5ec79f3da19221adee62ef39329fe4920a1ca72057fe069332", @nested={0x4c, 0x5, [@generic="3813484b2a5b1ae4887846d183f24bde3f6d0c726189eb1d17cf93c3fdd049041b0a743b80f561d07f9bf50fdc1041741e196fb299bf1ef812643c62f1cc423f5f0073030d"]}]}, 0x2224}, {&(0x7f0000002640)={0xd4, 0x39, 0x0, 0x70bd2a, 0x25dfdbfd, "", [@generic="daf006e5ac81a3214b5360ba0d882f", @generic="20c0075efa6ed917e94345c1824492892ed93e4170a6cb56d925306cebb790fe5612e74a017e1c785d5a01e4b713039d5178b862d65834b91e94166ef33e011dec222ceb48308e8c7a29ce9d2d4bf7caf4484cc5819ef9ad8ca402ecdabd79cf43ec35869a474bac894d1aa1a8b0b7ae9dfb627be839dda7b841246431e3805097a6e7587e19635fb6807f768cd5fa69845f0f9e3055b558983cc0aba74fce002834d41f385fae51c7796710441794da8b72"]}, 0xd4}], 0x3, &(0x7f0000002a00)=[@cred={{0x18, 0x1, 0x2, {r8, r9, r10}}}, @cred={{0x18, 0x1, 0x2, {r11, r12, r13}}}], 0x30, 0x20000004}, 0x10) 23:52:07 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:07 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x02', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x200000) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4004700c, 0x148a) 23:52:07 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:07 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) write$UHID_DESTROY(r1, &(0x7f0000000100), 0xfffffe97) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="6def7279266120008b4d"], 0x8) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 23:52:07 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:07 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x03', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c740700264073b600007a20303030303030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0xa, &(0x7f0000000000)='encrypted\x00'}, 0x28b) ptrace$setregset(0x4205, r1, 0x3, &(0x7f00000001c0)={&(0x7f0000000080)="05fca6e5b815f29a195103aba8354b8c4a25136c9ffb606ce29e4043de8d6c6dc04dd368afc4f45bc0c2ef780d9348351cde26a74aaf643b826d2a4e2d37ae3b158a79ce9be7bf44df09a0695c9eae0994106ace40589d6adf4925a4fbbf93148112f906816ea6b22906776009018c229048536c5eab21adcaef774680007ff4", 0x80}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000400)={{0x3, 0xb, 0x539, 0x6, 'syz0\x00', 0xffffffff}, 0x4, 0x3, 0x8, r1, 0x2, 0x10000000000000, 'syz0\x00\x00\x00\x00\x00\x00\x00;\xfd\x10\x99\xbc\xe1\x8a\x15\x00\x00\x00\x00\x00\x00\x00q\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xc1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x00', &(0x7f0000000240)=['IPVS\x00', '/dev/snd/pcmC#D#c\x00'], 0x17, [], [0x8, 0x8000, 0x3, 0x4]}) r3 = syz_open_dev$sndpcmc(&(0x7f0000002f40)='/dev/snd/pcmC#D#c\x00', 0x400, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002fc0)='IPVS\x00') ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000002c0)={0x34, 0x0, &(0x7f0000000280)}) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000003080)={&(0x7f0000002f80), 0xc, &(0x7f0000003040)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000829bd7000fcdbdf250900000008000500050000000800040001000100080004000f00000008000600090000000800050007000000be927397c7908c3ff243fe4d142eda2dcb12617679f4224b92e5bee7035ba1f3e4a51d5d31fe68c9a669d1a93567a600db55ab2e8ff35b10b15292fd79e3dd763e829b3799f6023b58c6cbacd4483beb9594e5e23c3e3bcf3f9fa1860d6fd3bd7b5c2ee491c0993576332a21db94aa97f132d7c275d726baff78da215a29e609797c4b226a5ebd20442d985a46bef0e1ba260796bafd0d8b7a655b8f09db06484d4f8625f2d8f9b30f3ea871451f50002b61cec47b09bde2"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x800) 23:52:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x200001, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x1dd}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xff}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x8}}, {@default_permissions='default_permissions'}], [{@subj_user={'subj_user', 0x3d, '&keyring.mime_type/selinux/(,.keyringuserkeyring'}}, {@appraise_type='appraise_type=imasig'}]}}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:07 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x800, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2b6d656d6f344232ea15d29bbb5c327900"], 0x8) 23:52:07 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) [ 302.002965][T19907] encrypted_key: master key parameter 'default' is invalid 23:52:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4080, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 302.067916][T19911] encrypted_key: master key parameter 'default' is invalid 23:52:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000040), r1, 0x0, 0x2, 0x4}}, 0x20) 23:52:07 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:07 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:07 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\t', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:07 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400, 0x0) ioctl$MON_IOCX_MFETCH(r2, 0xc00c9207, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x3}) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x1) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0x2) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new defauuser:syz M0000p000004096\x00\x00\x00\x00'], 0xfffffffffffffc48, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7, 0x4000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000002500)={@broadcast, @loopback, 0x0}, &(0x7f0000002540)=0xc) connect$packet(r1, &(0x7f0000002580)={0x11, 0x0, r2, 0x1, 0x743, 0x6, @local}, 0x14) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:07 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:07 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:08 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\n', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x12002, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x15, 0x4) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303030303030303030303030303030303430393600df70411cc36109d6b69443835e56cbc6ae5bd703618a61ba3db1000ea0e7685307e6122a99d93208dab8ec23f174486b24734ddd5a941a789118a482fe0c1a0f3907fc6cea16c174f5c20936d92dfe04a3a549a8da1e73a72e13f312e427daef06815a304d5a6dbec2d936386b6c870ba43e60eff8b7ddd52dcedadcdc8df463f279f20145d7b524b220f351fddc9a025c9d1e5fa835"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 302.345406][T19945] Unknown ioctl -1072918009 [ 302.398785][T19954] Unknown ioctl 1074025834 [ 302.408584][T19951] encrypted_key: master key parameter 'defauuser:syz' is invalid 23:52:08 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:08 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000001c0)="ca1d7017f7a1ea86abc1a3d5ecf0a0d5d89d0c6c7ec717c348751daa7f2b085386fa09b57c3d27fcd722db29a6c7c609ebcf44f826e58529ea9dc0edb4406b072c202c4b204c62da9c275376de5d190231644d4e0fe09677d1d295b996b0b6e8db14a307e0e783baabe19ff07d7bd94efe4ba23aa585d32c72b29fdc19f284989b53bf6fd5e0f26c7d90d6bebc4a099f44fd295826dae2bbfa146c97ac31a2c22224700cd1f5152aa84378756942d4d204072e1a836eda43de26450c0344a06417a7939461a171df39a2a1dd4339c9c52ecdd3eac8be98b841b482386112c89a478dcabc8785c0b1cb793d763fb991dfd145ca3fb12937dec94efcae3d92d3833dd572fb8a77d0708f1f50ab1ac36100bad3b845061ee58a5a261cb0845b80d1b6dce52bdc7cd1b8197d1250ae3ef4c02bb6a8b78fcd55995324dd646a3d6b828d61e804fc228c15b3e50f8a744f0850d00c8088ca93ac8db47a9e3c824cf482fbb47edeea7d5a097545e694e4e76052920a5f97bf3f15f43eed5a9b70a764a20e8d2f6c5be7423b78857d600bff1fcac7871278202838bfdb97b0cba03c9140da0f1e0648054f7768f969050e2b797b8ef8faa341d0cc81cbc24ac295b327357abdd286c32b1c069fdb9f4eac9c0da9c9001819c997d7520eabbadd270c9899b4c3c65c9618bd58803c191cbcdffa7ca4149ba376af35f4926510e1dafa0349d3ce74f9bf855147436e12fac0981d3a173b00c58e8fc3877bd12bf73f5297f21b5f981f600b187e8910ac7addc9c5a87b01a6260252b6d1ccc37704a707815164896066bc1c38a9e67dfce565c5c22c483f77ee3edb48629c3689e4d9118ad36e40237729b41a584e58508b2d2221cc1f0820fda60140a37f92f065c0ec3ae74c9cbfdbd5e73bec171917006236b1507252855652e0112cd8387331a077064beaf3d233c58203d4e72f0e8f28ba3fc2a4285d2de7de7c204afdb3ffb6c413548f32ffda8ac48a78636ab3c83d6f0225801df7780c97588fb83eb8b8413034a8fd8970eefabc0355e2e56a772731acdc96dd1bec3679d3b76dedd4c64d5fa21ca115206c998bd9de380bda7924aecc075101e9f86799c92f6d887b153e60fd34e1abcf6267006efd2a1cae6e300918c6bfef4961ddf8c45a320c480e8da6640c3645be2eabc203814a0a39b6be38e653972ec91290f3fb02f7e22b3a7839490001bb3a01650e4cd882ede2a4a83b1244a626862a960f3e757e6b09d5e6adf4d8a90534fd7a77ba5a2191e39fa4b5ac669df5544ea92a808f10f47e813eceb93eb15b568178def6c412e8c3e781a9c7d6576a7b9dc6720fb74f866c90db1c3c3b76230647ab42e8f166309297e61617a65eeecabf1a9fb9c965be05246fa21210b2b08a52604ed2d015359fc3b760fafc300f019017327cdfed92b00bb4b97187ebb4e464f186f03bb1d6f3e2f2c7da31149bb8613d660da5a082cd702d4be347c52488ac24849f680b0dd627b14c0ac635fac599f93f527da9e4f9d67bc9a3cc89854be0799a5045964c2805ed87220820d2e934dee1b796e65beb13b1c181ba220c278897e13a3e710adcebd29573603c0280c9912995c7a9aee422f7402d2da43f45e635af8dc8852be5e79fac5670d9502b364f3049861e98968aa6250711effe5b106be2d4660c0dd9e34701fb027e2849945dc04193fa9ccd9cf90b7c36177be2a552e1ca5d0f9f1199b3fde95c439721ac49ece567845795538421fe63431eca9fa6558cd0e37cbf685b21f384633806dd33717aaa088867403abdabe5f00342c7121a07640efb21d9c5f37b16af49e2cb426ea63a3965d5a9a7051b696314764226c8de710f544a0bdf2f716464bc9c94437c1357a7c3c51857e6f5074fa5e9bf55fd943462135b210727a539aaa57282594d52bd326a13766490a4c31e413f82c0b8bfefa2c1d50fc27ec9d3bb0b048f216111a8c6ec201b4cd0ca550c0b64e7ca0027bfe3581c152b0f06ec1ceea023defa09c0d5ce39728d03b88db6977ed7f953b19490574f54c28d789e3fb810eb0467e4cc493747511d9002fdbdb92aafa3a999c480dd4075d70b50235c9da679b5915649c91974f846a7d5936177949b24034606f967f6390931879b59976d73ca27e49dc561fefd37155fa5dfb9b97ebc29368c93cc70e8e9029403506ba1093922d156ea7a8bfdf6022ef23ab5918e0d2b600d6accfcbcc0beac7a582ed390e2e091442f1578baaef1402414ee0efde2164d298d47867d7852e32617513500f2d2dc81c7131e0fda79ae91ee8e0964084a880494254d053d3fc1b95fd6a27ce8ce5d5f716f32025ba5c58ef743b82913c1ca1cb59d13d1685796ff4fd1a55d261c7dd0a3dd2e97decfdb8f7268cf1abe2f3f9f0dfdd327faaf0cd95f9fcc5cb9b1ea98ef7c6b011644489aaa6740a7cc3fa555d626231ae790f13eff3e82bcd93870437265ff38b50538f563a284db28425adc74ae0013a49c18aee38daee4cb6d8a649f90f19d5f10427699b4a8d8559e8df0aa9e4546ff3217dece294e163ffdbc3028606969f46638ac7e3211f3eb047fe1f5fc133efae05e71895b62da7af393e464001f81ddbe22ef9823cd7ae66fb174c1ee7dd4dba176a35c1bcb416e5cc156b2f487c13b2438d32a5a18481af936eb7de9ede403568f5edbd1594cd2af85c2696acff40b59a825ced519c945c73f6cb4bc7b1132cc0a2a4a93d7fba6271971e07bb56bb85e5ee6a43991fb5abb51e0e3ffff36bf84098535e5ea296711ed720a207438b79f732a1b9e228d1578a08c59c48b2e7fdf1703a6aff66209dee76c41f64170eab1e5fd4a63264dbc00f8549b8f7b2a47bcf155e304c662d631032faaae218d165d29ce466165a8377d011abcefe5b42bd8af812faa9fac3f396bd728f2f062d6012fd597f8d9f2c0d9c23d0d69d64175448a954a24acc684424d49fa6af55ae6cf73c0e91ef787ddc1fa8c4b5a3a29b2655a7b86059698a1ca0c76d6bfecb4e93b46565d169a876ba4e9542222dc71c3d027883fcb63526aec50216508e6e3e63148c9146c5f677832bcef8e66268fb2b7d40153a266fca9d60b6e812c77290372f01f195991ba12f351a6b967f82ebe9c847537da3a83cd373d18f4020fdaaf6e16f7143f49f373ef1581975826b2777959d200bd1b0b5b72d812fc8bc7e6d4456d0e475ed90a24d3fb9d0a54c8aac781b135cfefc14c693ad09c31c92759fa234c64bdb31e859115d1112c7ed51c3d2237886d13be1e592215f19728f0fbf8737359e970526cebe58e41fd4c0cd8f2c7402f141ab5b22a301c35a20da18c46ad3aed38ce00d409de1fc2f7fb7e99f6fe7e564e9702c3f46726991d3df89939f4dcf32f2edeec372fbbb7151b05ece7011a147fac2dd98528d511b58b8cd1d8fc7ca6ba50be4f57eacd461d7947e0c445a3d2257646da5a0b1720f0aee7044dd4a66d24211c4c6b5b4bcc5dff0053cb7a164d3ae59bff17d349039b40283352f66fafd05022547d0422ba02e1e712303eccf1c96e8b1ca2f8b27eec674c310b209e27a81a8760d29bde8ccf779df9b3de6fb7a21f5a7f323d45db18c0c081082667566f60eb1c08bb1ab49b30ffe7de03a98149a8dc85967f87dc31a1b68cbbb04d522790a1d396f9ae6fb5225670da0f771909dfd25b4ad352d0383ebdf68ad8c58a923a6771b22284b7c51d37e94937031df2fe31d6060c0dca70198895f71fcdc5b8b33f3a41f682e38902f22371e8760b9eceda1e26a206e4a9057ddcee17d6b10d589eedb24865e37b8ccc01166291c6ca67164291a533c8b012d32eb037058cf01dfd239b5598637b2ad79969a74f2c72bbbabe1777d1218c49b4ea8e11d07364d46d06a400286b2678b1ec037a7eae7a34a38c41cd2588c2e8c5ce437908e05d28d5034f5ee840e412f6ffe8e021f2ca0e163137dd0960b946a1a16ca4fd881133d96c7284e4fe4210ee7e1d8d9c9f30a9e4b95345d40eb7aa0aaf55f4fabdc0929b5075ac001f3457532e0514834e10439bfd456e0babfb7d092ab5471dbe77e2eaf62e45705c2500e984773b0e947a5487d1ab83beb681ed77320d959bc1d01084c3ebd71d3a484636c5b82ea83bd877d2985c56e8190c79fdea97e4425f7bf03ac604b4e30331b6de70a42e46ebccc30ac81ecf7d08f01d1912af5050ca95cb3b1f20b1672bc32eacca2c2e8d5424f2e0f28bc2eeb5a174c4118e459b7f5b51a7f1edd22fe63c92359beba8264f1f92aef22e7912ddf7b34989e8802039fe3983fa760e1343020ac98914e74b2e57a303300f667fd9efcb1743d38e4d4614e65a818c83aa6760ba996c1b82f2376dac32f03fbc87803e6b4441758d3d6cf053fd61bd75ffd6f09fbd3bee22e6c32b4cae3e49272aec8680895f4ea43c2b6897a46d9824fbda229976bd0925ffbfded2611d347320881ce582f2aadf917df565708f8cc6375ae681d45635b616e56aad951b4273b44fdbffd3f1760581d0cb7a4a68920bc69e3c62ead8fa0efe4b3f4e4b849956851c42eead68496ab8d9253334bdeba38643262806624ab36d42c9c6a2422c2e7bd8444cc4a4e9f9f34607632d21e90da578b8939836fa0451394d3670cd93f3b7d8ecba6e24b3c25a34a8be80613b945d8d6ac3b45fec7a46eba0157b15a0aad7c456d53879c01a733b4b55c79e85a7c9fa04c76581eb23bbc001cea571f95da436b014a4287debf5560cdbb2d7f16728aef8f05748bcf43bb7a093e03e2ee3fec2beb56d01b4f70343ec0150fe9d31680fff7c7f713f7097063a7fc9db4ba285b421c33ae26106ae11f2b73ed4a1197163990b649f80467ec226d91ec3d560d5ef05f1302a4b3074d77706fd0bc74292e8a72f2dd906fa539113667790d79eb6c21b468d9f2017cd762e294579ca09b2aa1c2b7324a357fe332dad04e040aa5908309e5a14f7e6743e534d898e1a4968c31e7b127cd29234ccbdd9fc8978d127b1f1b57d2f1a3c63cd2988fc748277f7e98fca2b1352f9ad26f7b3879e30b99d4eaa83d664af3d44dcb6dc349cc608d59bf303a065a74e6e972e2c485260745c6a6fc8d8f3c687a21712a9bf92442844e1c9e6b08fd1a43b15e9bacee15003451f61427a40c8dc2e3af0238e574d422600cd883f82e8ff255be7ef315f641c0b58db16c053008db6aced9501555ef509e56eba305664543e1cbd25a87e902999b0cedd4dda2cbdb36e15233adc39d536c58ec22c1e4c31f4a02326444633f22f1869308e7c7d4326bc29b7d30fb5d379d85b910396c520d7ab488f477aeceb92cf909f1e1e0435d4f4989d3d91a678053f8904f48fcb0ecbdfece868cc01ce9943c2f16d88815362ff4608428f943f6f6314db8e783e1988a21b740d96ca079339d73c32747d0bd3d35a2c717241b7fcc376b1e520181d800da3591e60ca41e01ae7b7a78a5f9a9575fb5b4d316006ec15fd07fed2f818c0f04d82765386fc01309c380a63512cd9e4d4691b0976ae91b0e216a167ba0fc7cf4f6c392e0125067cd60501009c5b3b71b0ae8eb6062e170f1f4098ab77bc4db87a9206fab3032cbaf912e3ae425aab4af770fc9ae6b8d891a0252509ce68755302f56269bf3797f57bfcc3e1155074e0a17324e1789b012f94e9a2ceec1549603bf2931eb13b879a9c9673659c7331ca638764e9935e4e2bdbf43e9e6582f7facdb76112f17b680a31b92e3fbf40e543e5e9f42f0f93b74072f0ca7383d4e57666bd981a2d4b018aaaa17bae8f0b8fb6", 0x1000, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r0, 0x0, 0x0, r1) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 302.451408][T19954] Unknown ioctl 1074025834 [ 302.465853][T19945] Unknown ioctl -1072918009 [ 302.478697][T19961] encrypted_key: insufficient parameters specified 23:52:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080), &(0x7f0000000100)=0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:08 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 302.569193][T19972] encrypted_key: insufficient parameters specified 23:52:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x5, 0x200) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/11) r1 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000001c0)="05e55e57df3f3bed7c2afa6ca030a0baa327fa3b543ca678c55d3fa8ceec414f4524e6f68fb1feee6f5db6dd845f44b860ea783f203ff0c22ef7660f9c5abce5f43db4c87ea7cbf20f299c7f6b4844d9ea747dd665929c77d43882d85e1b0914", 0x60, 0xfffffffffffffffa) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc71, r1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x2dab) 23:52:08 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = socket(0x5, 0x5, 0x9) r3 = semget(0x2, 0x0, 0x40) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000280)=""/245) r4 = semget(0x3, 0x5, 0x22) sendfile(r1, r2, &(0x7f0000000100)=0x5c, 0x40) semctl$GETNCNT(r4, 0x7, 0xe, &(0x7f00000001c0)=""/184) getsockopt$inet_mreq(r2, 0x0, 0x27, &(0x7f0000000000)={@loopback, @broadcast}, &(0x7f0000000080)=0x8) prctl$PR_SET_TSC(0x1a, 0x1) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:08 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a203030303030303030303030303030303067a0393600"], 0xfffffffffffffc48, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001340)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff2000/0xd000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000fee000/0xc000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000340)="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", 0x1000, r0}, 0x68) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x1a0) epoll_pwait(r1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x8, &(0x7f00000000c0), 0x8) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f00000002c0)={0xffffffffffffffff}, 0x1, {0xa, 0x4e20, 0x4d, @rand_addr="e537647eba7eabe13bab5bd0d2d289fe"}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) openat$userio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/userio\x00', 0x121004, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:08 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:08 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) [ 302.763445][T19994] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:08 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2540, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/75, 0x4b) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000001c0)=""/4096) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1, 0x10080) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) 23:52:08 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x1a72, 0x202) bind$rds(r0, &(0x7f0000000200)={0x2, 0x4e25, @remote}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8000, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f0000000100)=0x200000000) r3 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f0000000000)) write$cgroup_subtree(r3, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000140)) 23:52:08 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:08 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:08 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='encrypted\x00', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$instantiate(0xc, r1, &(0x7f0000000000)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x101401, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000240)=0xbb, &(0x7f0000000280)=0x1) 23:52:08 executing program 4: r0 = socket$isdn_base(0x22, 0x3, 0x0) setsockopt(r0, 0xffff, 0x0, &(0x7f0000000000)="36e6955ed60d54ebfb2908b82682852b1f0d214b75f03683e5d042afc7f56ae7800386ee0853ce23df443d98f7c9180e6f9281ac1e7fe4fc0c7647cddecba326e963cc1248e38c08b801414e3eee5a6457fc25eee6cffb4a3c5bdab1cb1f36575a5b94d67ad27ab3de9d722ad5bd78b01aade825df66c112dc09ce945c10cc8048eb91defa9fae116a977b04b0", 0x8d) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0186416, &(0x7f00000001c0)={0x7, 0x9a, 0x800, 0xfffffffffffffffd, 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000000c0)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'encrypted\x00'}, 0x34, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:08 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:08 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180), 0x2ed) [ 303.162263][T20038] encrypted_key: insufficient parameters specified [ 303.210288][T20041] encrypted_key: insufficient parameters specified 23:52:08 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 303.251219][T20045] encrypted_key: insufficient parameters specified [ 303.281140][T20055] encrypted_key: insufficient parameters specified 23:52:08 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl(r0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x200100, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000007c0)='/dev/vbi#\x00', 0x1, 0x2) write$UHID_CREATE2(r1, 0x0, 0xffffffffffffffb6) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000440)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @pix={0x0, 0xffffffff00000001}}}) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000001c0)={0x0, 0x1, @start={0x0, 0x1}}) mmap$binder(&(0x7f0000ff8000/0x7000)=nil, 0x7000, 0x1, 0x11, r2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f00000000c0)=0x2, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a2030303030303030303030303030343059c600000000a3e1c31fd539a3e65ae72ff0f9557a57e420dda72448a773173579ffc21a93a399d5ea2472ccf8b0b53583a5247cbc5b09bee173d876e521b00e9cd6c95bc871eced1d65797e4d23b1862c76237087496d7af01e2a06f2a664267390b2ca9fd37364dcae9512a8b1f9693395a0a74366e04b63e26087764aed1345690ecf6b2947a85af23397cf74779b186da0be5615af6592d7a717e147a994af5d886622c494efb6a3c9fc7f8f8eb178cda1254a8bc7d60750da1d4afaf8376ab79d13b4d77f0a8a9fe7e57a5babf0fe0a7e16f351e72e4d257312ffaf"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in=@remote, @in=@broadcast, 0x4e23, 0x2, 0x4e20, 0x12c000, 0xa, 0x20, 0x20, 0x11, r4, r5}, {0x1, 0x3, 0x7, 0x0, 0x0, 0x5, 0x800, 0x2}, {0xfffffffffffffffe, 0x200, 0x5, 0xb76}, 0x9, 0x6e6bb1, 0x2, 0x1, 0x2, 0x3}, {{@in6=@mcast2, 0x4d6, 0xff}, 0x0, @in6=@loopback, 0x3505, 0x4, 0x3, 0x3f, 0x3, 0x60c5bb4, 0x4}}, 0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) 23:52:08 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180), 0x0) 23:52:08 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:08 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) prctl$PR_CAPBSET_READ(0x17, 0x13) 23:52:09 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:09 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:09 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 303.481426][T20068] encrypted_key: insufficient parameters specified 23:52:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303030301030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:09 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="2b08000000727920d4f7ce8242ffad62e2710a777aa3d29dbf8f78bb84c1e53e4304dccbbedd1ac8720f35c68a36b83c1a653f0200000000000000418a9a17bff6ced41b3a1575b6999b08de285fdd4724e4c7f7a6"], 0x8) 23:52:09 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\xff', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 303.573038][T20081] encrypted_key: insufficient parameters specified 23:52:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="e7d27720646504617582802f20304000000000000000303030303030303430393600"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:09 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:09 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000080)=0x9) 23:52:09 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000001240)={0x0, 0x10, "4a85710439faaac979d36f68c60ded04"}, &(0x7f0000001280)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000012c0)={r1, 0x3f}, &(0x7f0000001300)=0x8) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e48772064656661756c7420757365723a73797a20303025cde95077cfbcf45d30303036000000000000"], 0xfffffffffffffc48, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001200)='/dev/vcs\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f00000000c0), &(0x7f00000011c0)=0xc) r4 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000001c0)="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", 0x1000, r4) dup3(r3, r2, 0x80000) 23:52:09 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) [ 303.761718][T20110] encrypted_key: master key parameter 'deau‚€/' is invalid [ 303.797139][T20114] encrypted_key: master key parameter 'deau‚€/' is invalid 23:52:09 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:09 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:09 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:09 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) [ 303.915660][T20125] encrypted_key: keyword 'nHw' not recognized 23:52:09 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x10000, 0x200080) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$sndseq(r0, &(0x7f00000001c0)=[{0xa3, 0x7, 0x48000000000, 0x2, @time={0x77359400}, {0x1, 0x8}, {0x7, 0x1}, @control={0x3, 0x79, 0x8001}}, {0x8, 0x4, 0x100000000, 0x2, @tick=0x40, {0x5, 0xf5}, {0x0, 0x5}, @raw8={"37d0c4ade57689f84dbdd54e"}}, {0xc7, 0x1, 0x6f4, 0x3, @time={r1, r2+30000000}, {0x9, 0xffff}, {0x9, 0x4}, @control={0x100, 0x2, 0x3ff}}, {0x80, 0x9, 0x7fff, 0xe09, @time, {0x3, 0x74}, {0xfbc4, 0x1}, @connect={{0x9, 0x6}, {0x4, 0x7}}}, {0x7ff, 0xf253, 0x6, 0x0, @tick=0x17cd, {0x8001, 0x4}, {0x40, 0x101}, @connect={{0x1, 0x7}, {0x101, 0xffff}}}], 0x8c) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000380)={'filter\x00', 0x3c, "02b35cfbebcc6227ffc652edfb93d5e630ae371a17df6f3c42287a99822d78a65cb0a9d116d8c08712b6a611f0c04952284c08ee5ad87325f665315d"}, &(0x7f0000000180)=0x60) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r0, &(0x7f00000004c0)="b0282fd50e0125d921fbd5b77affa8e4", &(0x7f0000000500)="93ad592092a3f656295f1803d688c96a474827a47179202b0a4a09c278da3511c29606d2890213e3aae646a157b3ddc62ce1866ec7639e9f21642d72a5bb08b9eadd64858f8d3e934e8ff614dac9a2291c9a49714fd7d16c0e708d3f3ad180a4c42a6c232756318c95e3e05e5787fe711c5e2e60673181e95e310a227ec0d6aabc5e0f8656d1b403da54026e411ea61bdce8b726962e7962ef75e1a47e724b01e7c5451feff484d8b208bdeaafeeb2ef32e2961a3eda1d9ae452caaae78158ce9c93c459f7c0ac3960d6a1577f5bc69d38b9571460171b395d80d1fd4fbcbdebfeefd8b8862b105b698fdbf0403c31513fa4b7b05cbdeb7d00"}, 0x20) r4 = openat$cgroup_subtree(r3, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x210000) ioctl$IOC_PR_RESERVE(r5, 0x401070c9, &(0x7f0000000080)={0x8, 0x20}) fcntl$getownex(r4, 0x10, &(0x7f0000000300)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a45352, &(0x7f0000000400)={{0x6, 0x3}, 'port1\x00', 0x8, 0x0, 0x2, 0x4, 0xfffffffffffffffb, 0xfffffffffffffffc, 0x4, 0x0, 0x1, 0x4}) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000280), &(0x7f00000002c0)=0x4) write$cgroup_subtree(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="2b6d656d6f7279205fd56d56283b0ac2cd12af07d328"], 0x8) inotify_init1(0x800) 23:52:09 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) [ 304.014345][T20139] encrypted_key: keyword 'nHw' not recognized 23:52:09 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:09 executing program 4: r0 = add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="c788d98db7c3749ca54f744e9442adfcbe0cc31333faad3794194e845070a90bd9528b45e21643fa750144cf8e54353bf755cd3f7ac915fbcc9347a9683d0d2a276793603242be9d855b19e7dc72354c0a2f12be97083ff32d82c7f71f840dbfea5726e76d43795a4d7730fb985d2690a1f9c2da08cc56aa3995fc436075b6362a3a65f4b256f807428cc0424d7b6d2f85ccbec850b14d15431f2ab84d12e6d4ef7e65ac0df08ed36b5ca2a34a465cdea995802a3e5898c0d3bc61f251872abf7f40b5d4901b5673de914feea0a136b4d69e5c9320f33c504811397d840ce371d7be44425ec92c93c0", 0xe9, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="1d62c2707bcad7bdb016bfd355c390ebda208581519ddc9009a68b8ed22a0a8cf72aa8220923e0ce8872fffd4c28b8f69ec9526cc8806b673f8bef5262f349e8899468ee2d76115aa535fe0aff544288c982ebc8434af9fa522fe6b289b3ad3812df8e7d7c8770b21064d7c8185809", 0x6f, r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xd5a, 0x0, 0x7f, 0x0, 0x4, 0x0, 0xf, 0x0, 0x0, 0x40000000000, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657747b90c5e61756c742075736572a705797a20303030303030300104000030303030303430393600"], 0xfffffffffffffc48, 0x0) r2 = add_key(&(0x7f0000000380)='e\xef\xbf\x9b\xfetr\xe8\xb9\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000003c0), 0x0, 0xfffffffffffffffe) write$P9_RFSYNC(r1, &(0x7f0000000340)={0x7, 0x33, 0x2}, 0x7) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000140)=0xe8) r4 = getgid() keyctl$chown(0x4, r2, r3, r4) 23:52:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000080)={@dev, 0x0}, &(0x7f0000000100)=0x14) connect$packet(r2, &(0x7f0000000140)={0x11, 0x1a, r3, 0x1, 0x946, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x14) 23:52:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:09 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:09 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="d0baa102864bc303cc3a28946cc830a0507142e2deaf3da463afa864c789d93d2f67bcee204bf1ddf6f301103ae96d0bf3e99810a2bb14f828b2ac69b60c28c7470a89341ec8bd29a03547bc3ea0afe0d1250af795f90df6ecedd6ae8b3fad11f04443f3d3746ac5d19c47ca3054a7e4b48b7b0284579816d95c5e53c4d4c84e497a1112645dcc0b4cac8dd8ed131e0931947a0868a0ef42e4839088012fed74a6d39bb72d2354154ecaf4e205e7024baa2f481e9a4f94f4997998e6b43ccc644cf2f5a6fdb5b9fbcd79b5951173224be8db2e6893a5d96d6fc416640b441d9ed8e3", 0xe2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=@encrypted_load={'load ', 'default', 0x20, 'trusted:', 'md5sumsystemwlan1em0', 0x20, 0x100000000, 0x20, [0x0, 0x38]}, 0x42, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 304.216025][T20164] encrypted_key: insufficient parameters specified 23:52:09 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:09 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='+lt;ory '], 0x8) 23:52:09 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:10 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a7379de13661884adcaad0a3776f4b61e7a2030303030303030"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 304.350508][T20178] encrypted_key: insufficient parameters specified 23:52:10 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x581000) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) 23:52:10 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a2030303030303030303030303030303030346ecadad6"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:10 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:10 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='>memory '], 0x8) 23:52:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000001c0)="8e4a7850e5df5a1f0b97bf2e2c791b9787afe10646d2fd34221c35b39e4806fd3db0db8cfbdce15c9c3aef3070851d1d5b44ca382bf7d9cf4fd559da84d17ac6b2d8dc51652cd618711783ab3010ef92c9682c153966c971dc503711287036657bcbe455d026f682f44c6c3ca2332d3cf34ef4fcac4c4e393450c9f0e384c80268259f6ab94b53117691a0f98557bfb58b39d5b33df369bb5d5341cae84c4c4b98582ae2e39b854da67c0f84b79b8c2c90cbb479b9f17f1c0fa2ce9dccc4a32932ba307d400f78940121ba18129277234fe98677", 0xd4, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r0, &(0x7f0000000080)=@encrypted_update={'update ', 'default', 0x20, 'user:', 'new '}, 0x19, r1) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xffffffffffffff16, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x600000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0xc7, 0x9, 0x9, 0x5, 0x40, 0x6, 0x69e2fa21, 0x0, 0x0}, &(0x7f0000000080)=0x20) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0x559e000, 0xff}, 0x8) 23:52:10 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:10 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:10 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x800, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f00000000c0)=0x8, 0x4) r2 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="2b6d5b6d738679206c9bcf8a2a80a372912152d428155cb7c1127ac9e7f7c28b4a571008e574c198fbbe7fbd058e1a6a33ddb5d155729ac5f0b803fe057d00324590389222f8e75a2808a8dec97c8c75d84e502116beaf2a8cdee810d1fbed44b2bb3959f98c045bffc31bcc8305b24acd624694c1"], 0x8) ioctl$CAPI_SET_FLAGS(r2, 0x80044324, &(0x7f0000000000)=0x1) 23:52:10 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:10 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4003, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x13, 0x4) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000080)={0x3}) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420777365723a739fb711933002a86d66aa2a797a2030303030303030303030"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:10 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:10 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = socket(0x10, 0x80000, 0x3f) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000001c0)=0x40) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180), 0x0) 23:52:10 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) [ 305.035192][T20253] encrypted_key: master key parameter 'wser:sź·“0¨mfŞ*yz' is invalid [ 305.072897][T20260] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:10 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:10 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:10 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0xfff, 0x900) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x400, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x11) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x8000) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000003c0)={'nat\x00'}, &(0x7f0000000440)=0x54) ioctl$VIDIOC_G_FBUF(r1, 0x802c560a, &(0x7f0000000380)={0x10, 0x9, &(0x7f0000000300)="5b9631add315d7c018c779c29333a7eab21c81d6ef0ba4bf2869e1007b8ddca9226de1d34052525746d4b5783db5f72f13c2c3ed1f3f70c3e1dfe1e7f0c02d96a8dd60a7079b32a0ffa6e4fbf3eedef93602c49c89c41c30c4713f336a4ec157f94bd849b55685667797c3f2c8498364d6d2855adb8909580401919ca8b6", {0xff, 0xf6, 0x3a755f79, 0x7, 0x5, 0x7, 0x4, 0x7}}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x4) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="2d707f644600000000000000656d6f020020"], 0x19) [ 305.100759][T20263] encrypted_key: master key parameter 'wser:sź·“0¨mfŞ*yz' is invalid 23:52:10 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='.ew default user:syz 000=0000000000004096\x00'], 0xfffffffffffffc48, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040)=0xbf, 0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000040)) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000001c0)={"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"}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:10 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:10 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) [ 305.282001][T20285] encrypted_key: keyword '.ew' not recognized 23:52:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080)=0x3c4, 0x4) [ 305.347852][T20293] encrypted_key: keyword '.ew' not recognized [ 305.365413][T20290] Unknown ioctl -2144053727 23:52:11 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 305.392158][T20290] Unknown ioctl 1140895375 23:52:11 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000200)='encrypted\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x80, 0x0) getsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f0000000080)=""/21, &(0x7f00000000c0)=0x15) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) timerfd_create(0x0, 0x80000) mincore(&(0x7f0000ff8000/0x8000)=nil, 0x8000, &(0x7f0000000140)=""/95) [ 305.445997][T20304] Unknown ioctl -2144053727 23:52:11 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 305.470117][T20290] Unknown ioctl 1140895375 23:52:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6577206430300000303030303030303030303430393600000000000000080000a83b0000000056d4"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400, 0x0) ioctl$VIDIOC_G_OUTPUT(r0, 0x8004562e, &(0x7f0000000040)) 23:52:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c6d656d6f727920e9711ecb04c0cb9a5cfbb4e5ff414e0821955c6bc7a78cd89a07777f93b3b3"], 0x8) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x8000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000280), 0x2) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) fcntl$setpipe(r0, 0x407, 0x7) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xb6e, 0x1, 0x9, 0x4, 0x0, 0x1f, 0x20000, 0x1, 0xffffffff80000000, 0x4, 0x0, 0x800, 0x0, 0x200, 0x2, 0x3ff8, 0x4, 0x7, 0x1c8, 0x9, 0x80, 0x6, 0x5948, 0x9, 0x800, 0xfff, 0x5, 0x44c3, 0x80000000, 0x6, 0x1f, 0xe0, 0xfffffffffffffffe, 0x8, 0x7d1b387c, 0x10000, 0x0, 0x10000, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x2000, 0x35f, 0x3, 0x1, 0xd46, 0x8000, 0x1}, r2, 0xc, r3, 0x0) 23:52:11 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:11 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:11 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 305.643400][T20326] encrypted_key: master key parameter 'd00' is invalid 23:52:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) add_key(&(0x7f0000000080)='encrypted\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffe) 23:52:11 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:11 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 305.724918][T20326] Unknown ioctl -2147199442 [ 305.743062][T20338] encrypted_key: master key parameter 'd00' is invalid 23:52:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x9fA\x13\xf1o\xbf<\'I\xb9\xd5\x05g\xca\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2a6d81210a5186203cee66180febe9e8942a2b7183b27326b384813e0378617d276a0ec5adaf06e0cf3877988b0ba2453dabba9ed70839d0aca01f12b8dca9fd5a7df8c8ca618b2a60defc970bba5d47702750a61368df26f835cdacae09b176c4870db29c3683615725236a51d0c6f1e30b5545848e185499f1df"], 0x8) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000080)=""/57) [ 305.781474][T20338] Unknown ioctl -2147199442 23:52:11 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffffff}) ppoll(&(0x7f0000000100)=[{r2}], 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000280)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x400) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000040)={0xffffffff}, 0x1) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0xe6eeab99545a2d0c}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r4, 0x0, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x404c005}, 0x4) syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a45320, &(0x7f00000001c0)={{0x10001, 0x3}, 'port0\x00', 0xc, 0x0, 0x800, 0x101, 0x2, 0x8, 0x48d}) 23:52:11 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:11 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:11 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 0000000000000000t096\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x404000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x10001, @remote, 0x1000}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x4e22, 0x4551, @empty, 0x9}], 0x68) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:11 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:11 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:11 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x10001, 0x1, 0x8d}}, 0x30) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 000000000000000040@\x00\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) prctl$PR_MCE_KILL_GET(0x22) 23:52:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20304930303030303030303030303030303430393600bf6ed844e7ccd0ecdce36dcfe59b415c2c5176fea64d73f5"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x0, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80800) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) arch_prctl$ARCH_SET_GS(0x1001, 0x4) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f00000000c0)={0x0, 0x1, 0x100000000, 0x200}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000200)={0xf000, 0x100000}) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000040)) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000000)={0x7, 0xe0}) 23:52:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) [ 306.160938][T20384] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:11 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:11 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:11 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) r1 = dup2(r0, r0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 306.272568][T20394] encrypted_key: insufficient parameters specified 23:52:12 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7fffffff, 0x200) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000400)={0x53, 0xfffffffffffffffe, 0x21, 0x3, @scatter={0x4, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f00000001c0)=""/153, 0x99}, {&(0x7f0000000280)=""/133, 0x85}, {&(0x7f0000000100)=""/58, 0x3a}]}, &(0x7f0000000340)="ddf9b196a646d837439851ad3dcca505666fb9b0e3b46a3dad97c512fd9e905757", &(0x7f0000000380)=""/36, 0x5, 0x23, 0xffffffffffffffff, &(0x7f00000003c0)}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20\x00', 0x4c00, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000540)={0x0, 0xac, &(0x7f0000000480)=[@in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e24, 0x6, @rand_addr="e2b58468447fa105bbc25088bf8f1750", 0x2}, @in6={0xa, 0x4e21, 0x5, @ipv4={[], [], @local}, 0x5}, @in6={0xa, 0x4e22, 0x101, @remote}, @in={0x2, 0x4e24}, @in6={0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0x18}, 0x9}, @in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0xe}, 0x6}]}, &(0x7f0000000580)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f00000005c0)={r4, 0x6}, &(0x7f0000000600)=0x8) 23:52:12 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:12 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:12 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x8000) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f0000000040)={[0xf000, 0x1, 0x7001, 0x10000], 0x10000, 0x40, 0x401}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e000000000000003f6c7420757365723a703bba0526f2b7c38073798720303030303030305030303030"], 0x2a, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x3000, 0x101, 0xfffffffffffffffb, 0xfffffffffffff001, 0x0, [{0x8, 0x0, 0x8b15, [], 0x8}, {0x40, 0x8, 0x7, [], 0x7e63}, {0x3, 0x3, 0x80, [], 0x39d}, {0x3ff, 0x1, 0x6, [], 0xff}, {0x401, 0x14, 0x4, [], 0x2}, {0x7ff, 0x81, 0x9, [], 0x1}, {0x2, 0x800, 0x9, [], 0xfffffffffffffffc}, {0x8, 0x1000000000000000, 0x3, [], 0x6}, {0x0, 0x1, 0x8, [], 0x100000000}, {0x100000000, 0xb8b, 0xffff, [], 0x9}, {0x4, 0x6, 0x1f, [], 0x55c3354c}, {0x3, 0x100000000, 0xb2, [], 0x2}, {0x0, 0x80, 0xe1, [], 0x7fffffff}, {0x8, 0x5, 0x9, [], 0x4}, {0x10000, 0x9, 0x6, [], 0x1}, {0x100000000, 0x57b4, 0x4, [], 0x1}, {0xa24, 0xffff, 0x6, [], 0x3}, {0x4, 0x200, 0x6, [], 0x3}, {0xe, 0x5, 0x5, [], 0x1}, {0x5, 0x5, 0x1a0a, [], 0x101}, {0xb7a6, 0x1c1d, 0x5, [], 0xffffffffffffff01}, {0x0, 0x1, 0x400, [], 0x4000000000}, {0x0, 0xfffffffffffffffe, 0x0, [], 0x6}, {0x0, 0x180000, 0x7, [], 0x200}]}}) r1 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x8000002042, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000140)={0x8000, 0x0, [], {0x0, @reserved}}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200, 0x0) [ 306.440329][T20402] encrypted_key: insufficient parameters specified 23:52:12 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:12 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000005ca83c962561cf31d8f26c240a68efbfec9b3d757bc6fa651d1c1c7719223bf8fe21cb2e60b0a584471cd48312af6a4def1ac1fa7d28bf8fda8f961911"], 0x8) 23:52:12 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:12 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) [ 306.608722][T20434] encrypted_key: insufficient parameters specified 23:52:12 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f00000002c0)="51088b8677e25f0a6ad7aad6cc84caef09c65d245581cd0f0bc2796a0293d1c588dc31316ab15c7b5a09c7c97bb1", 0xffffffffffffffe4, 0xfffffffffffffffd) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80080, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x6d, "95cc39043c7fb4bb8a7b24e3820541037cc9777d68fcdae2b1b992019116e7ee8de2b6e3d54048539eb1b631d00234bbf4e99eb89f8da4813064d5ff6df80c14119b480d631dbcbc7a0fc39639f9ef9534b6979f35b491eea5295377b10a3917e30ee507f1742e8db9e4bc50d9"}, &(0x7f00000000c0)=0x75) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000240)={r1, 0x74, &(0x7f00000001c0)=[@in6={0xa, 0x4e21, 0x2, @dev={0xfe, 0x80, [], 0x25}, 0x7fff}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e23, 0x400, @mcast1, 0x8}, @in6={0xa, 0x4e23, 0xeda0, @loopback, 0x8000}, @in={0x2, 0x4e22, @local}]}, &(0x7f0000000280)=0xc) 23:52:12 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) [ 306.701277][T20441] encrypted_key: insufficient parameters specified 23:52:12 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) 23:52:12 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2b78e5a6f507c9a678e241896d0518501429656d6f727920"], 0x8) 23:52:12 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = epoll_create1(0x80000) epoll_wait(r1, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}], 0x6, 0x3) socketpair(0x3, 0x7, 0x3ff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000001c0)={{0xa, 0x4e21, 0x8, @local, 0x8}, {0xa, 0x4e21, 0xdd, @ipv4={[], [], @local}, 0x7fff}, 0x8, [0x9, 0xbc, 0x0, 0x10001, 0x0, 0xc58, 0x7, 0x7f]}, 0x5c) 23:52:12 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = dup3(r0, r0, 0x80000) getsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000000), &(0x7f0000000040)=0x4) 23:52:12 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:12 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:12 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0xf642fe9f67616a93) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'veth0\x00', 0x4}, 0x18) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:12 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0x40000000, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000100)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000002400)="24a8edd226eeecbfaf19e24fc7824b864164200193d853b08b24bbdb776709f4ab748f6ee98ee03b957ea8fcc6f0c7500aba9c42a501d4fbd5d353b699c88a7945663ed7aef9ac790269510c14a5d7e87e59234d15952c91bf796cee13ce42b049c6b34fb7d7ee406be444bbce8315ed8c44d76671662dde6a5c1ed699852ce4ec61a3969374ed502b584a5962f9f2b30a14f350ca60b1d3ed27e53b6de6bf693ccc067b527095917df6634ce02df006739973", 0xb3, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, r1, &(0x7f0000000140)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', '[ppp1ppp1$@', 0x20, 0xfffffffffffffff8}, 0x35, 0x0) add_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="344073594b7d9b828a4dc9fe311429aea1284b40b9d3eff7d70662f971e2dd875abcf466b491aa9ba9257e1a226bb5963eb8a05f6b67a72814955612d07a5325d60b59101472488cfb59cfc73636396b989de5668ee02091386016189aa17cbf49f24ec41c8bebdccdbcfc9bd2db924985fa1c43bb8d97200acaa645c3881909d6e1fe1e58af2cea5dd2426eae1c5dac16c18efea0744854aae1a39731bb8aa4702951a4adf1d6eb47e188495061e2b7e17f36ec13d3867d81e18b4cd6edd6013d0b88f69c2bfae5186eefe80ef8cd78073a8618eede8dbc09883fd6aa86e8fcaad749aee766ace401818a1712d6c193538a7fe322af168f545772a6c77a0d86d1ee13cd83b07a23eb147f13e5378a4cd91a3b3cd65a23738c5ddea539cdcb8a45eb0697938aef8515ecfc1dd33096c5784c607876ffca7e5dd3988f818a452504a2923c46e8d39553b3d1872019c57e1d86d33b59ec8dbd5a2a5c226f014234d8f87e5a5d9d565f3ec60d6062548a577f70e83a4cf77d95cc0a03cf358b934c61f117ac517855a4581f3ac106c8af0cc099611ef94ced8172cd16e5699bc33ba9dbec65160aa0a304519b1ba708226ed27e57c7c8065130b08a57d973f97a66918b73ab68ab1e5d9ea440707a508abd175445ca24c4acbda41d17ddc20c5ee8945cad35c92f04deee188b302021449ce711e88c391ea802bc5a6dafe24dda911b3e7e7d9169141773663717635300258150104115ef63d529899bc3ec4f0b73aaa2a0f27041d56823ed01b6547890a13c5f3f69395b25c66d99a4fbdb801700d3d667b4e33557627a5e65fbd1f58c5524928303c307d23c92b0d1fcba5e93f9be90df1eb8f46e180a24298d3699afe35c2438372d4d942e66a1bf7e423fdce51473d69ccbf79226bb4a25263bea22d10501508214f8a16a39af310a3c5aee85171aaa769042d8e9db42944d1ba3065cd98f417a45379bd8041a6a36bd23c86c6020437353b3e21fedad252ab505430060aece2f38ffcc282744e904f9945a609e15729e7950af098fe68cc5fa20b974aa235a4daa1183aebf91afbcebabc5b4c539b5967d0f09f0e344a3bd10c404bc10512b915017e696f8feb20e043a543d300a46ac6c10d47b441972a9bbb9c812ae30ba8fd0fdfddef162c3ac3d3d743a78860d26d0e63f2747f7b0b6d29c136a8b52b98a63f9c5acbaec042d75de7c5e44385f07b33d2abe5012c3b73444ab6c13facdb679db68fb75e8ca625a0123f5ce63bbccc21dd3aa1a62bf93afd905543275ec4c9c9675effa54daa7b081102674983d976be88ef41e0b37522401d90b0bea5503621eff33143764034e5dd7de5457ea9f189c96da9f117bcc8a477b47dc485a8f6bd149af2af17c5bb64852a4f1775b1fa88ea325476106f0cca8a01bfa00336bea67d222d6a6cbf561bd5b6250968871574ab588005aad56c50e1997331c017d9dcf40ba7a3b1e16b78b2b964884fc933d6e74843b396e2d5f8ff86b9176d46b7118cd78995bf634b51aa25d6f5b6684bed5dbebf67c92e3cd82d95c4c6112474479e8fc82b5a79304ac2e2ea90acf4bf378113812f20468807503feae547975f617135447ebd5b00640b7550fb4ec3df84e448be8779f1edbeba260540eccf528e8e34044bf5e9a13c6dad82a992ad082f4f9ef4d5f4fab9d3dd634b8f79c009e3e2420a5ef08f1b0b7fb979ceb090ef8d03609583ec49a9dfe4134028d8f17ecadcafd7b5f90bd0c672d8fbbb3e52686fdf805fa4f18b745d81a58a542fa6f184af8ddd4796b424bbb2db835a576c4aec351ad646af3e699671a35f29111cea8f223baa26b906a7a8e7a79b87690553080ef2e67a066d41cfa8c8b4416b3359309979cc9243d68c1b9f0968004144ebc21225d5f2521f0556f8f4c81c9a8109641849b7ca5397e8e92369f9501f88f564e69cc412672b85709693f7fd49c2062da0f0a37c40008a3d5b33408f501e685cb93576eba95916acf536686c943bd3af52c35eeab23dc5b50261be762349ddc680f2b37f57630372631662be4238eca48a0b3dc528cc589199c1b6d18fe4f3ec9fc743369a63c355c240f926aa182e960cbacf222a01f9cc0f30f97be595135c058e55f3af2409712bb5f05a8ff81bdfcedf259d4f6c93855ff8ef0e3d96657a63e17e80bcb8f4424c738a38ba8d9e3adf765e5c96e424470466e8cdc30296b3ecdc2cb1e381bb2f5d556c21306fb26792f1920e3fb1c1c6f9e7d039f365cc4372edffdcf150a1061d5ea97b470ffb68e44f9042a1b82aeb0d2dfe30a3b005a4bc985f529fcff8ca82a69bc977e955f9709e4085f3c2a43839fb1c37c68d98fd75e4a44a6f160979b4044aadd6173fe52442cb365ef4bab0c2cc2c1ec4d029316e023b2818ff15f35ac727cf9a97916c56492e0df887add6654db70fb2f1606dc81b2a5e0bb0d3a8d174b70e78ef467521e44600819ad7cedb133c37fa799d02decb42391417c0a3e21481d63b3813919009ca4bdd5050772ebe5f82f788275b6ec3a52a88093060f8ab8858ce478a47cc7e406f0fc7c473fbc6423ac99a1aa1ab64fa3aa630b4086a449fb1bf41dd6363b48215cdc4582df85910aa73a8df91f7f2a69389b41f436c744c0fe0f4fa6bd140358691260c63d1a0a8f0e791ec2073ca864f711b4eac8e5c471f4d8e3f37e066cf08694768d0621e2e04cecaf154ec570856f335924d00ee3c877b2fbe32674286f820eb31a8732c149be2c1d9421b0a352d45544ba3a59ad8c6afce34318b15dc9ecff1e8395d44273758900c88092a5b85397e08346a5d4b00c1b92f015e7b877a6e95ee2edc1204072cd13bffaaa8cfef599847ccf5337fc073de28ffd63da5f476e9ccc315a08aa52018fea494538921bee0c2b38d816ca1cbd43ca156ac88ddf6d0aada32af8d083dc2342a1f1fa4dac2d32d86b4e4ecec52e820175c6a97144c900cc33953b07546c29dd2e1b9b83139c73573e3f8a390a28f789e611d8ff6001d396f4c5b7289a6467f5e5d4fc0e24f956858d76bd9538e75ccbb96d2172d3395524303772a0a21d4422c040d28a29a2466c635de4f6e64813284567e554818b50c8c34e1283ffd37632120671f7848d1e15ef72c976b9bde3abd81ab4cd6e5704f58c1a3cb7c76a572f0d9da787c6eb8cc6adff90d9f10ae897d1649a05f57edb6322f8695118e6ab6a4f602b5e690680fa23326bfea1e5cc6603275df2ed404590a89115234a09d0f96f20165cef38cdd278a3d60153cc18544edb25171b95cb7280134812f933c41f4cc80fa949eca897c4ee9bdf5e78437660e55102675aa91f8a9f12ce755ffeb0ed2aea3bb2c0d43eee7cb39fbbd6a642decbc0595819a3e5432438bab18c9eae752164817ff408e220ac4a440d1209e3bcc9daed0ba1409641f29a692ed99177820810cbd6de7adcc979328d94bff47a5d08622e666e2526f1f4678b30734132a86fd01eefc280878f080e10924e7a3446165fdb0ae4535c2ff902d8efd880eae8817eacde2241cddb508b3090aa5ed5357a8e2e1b3c7993e890e0ddc6a120375c42e90a394ea3ab7206c1e00313cad2de78cfae6c1c20082ce47c2a2abe79ee16a679324732fa80ea561e80202e4de8aacdea025c0dbc63a6bb174c8b539598e7f49479affc19121855c3552e8b24da060440b592a7ce9658e52f0dad72383e20ede4479cebd67973c19c1a0b58effb14c88a32a94f8d0598f62606a04bc0f087175edb476445dcbd59ee5477f557b4183eaf43ee89a1ab0d187cce203054aad4b616871a3e7aace590c06098b1db073e2b7a5495d6abae71058186fabe9d2396f98b76cbdac564667c2d72b427fd2843806e3020c358744c4731a874fa435f08432583d4606ae1d2ec8f3bc04ca3395809f351e6344772044df12d4dd4cc1e160704b7d162a8dcf1cc86c726d9ca659e42966a958a1666f9858ac0b47a46ddd84f6f533b8b31107bf65b36e80d6a5108cb74e78a4c27879a260de5eb775e5b865254b0eee8d36a633795095674eb66fc81f989f78a603c0b81a6dc3cd9f6733a3262a9bc13a2f1c9c4e3d1f27ad83b657edfd287e27c7f0b89e5e724dc515f1c2b24796b772105a96ff87ad3b8a00fccad2e7a7113d7c6ef066ce8883c14a37d27e7f82f9720669aa9f8db4664a7b58f26b97de1c45e044cf85e36c09762c93229662d156a14992a25a43d5da1017cee5753e38f6ebf08889e36dfff52d5734aa701ed2528a57920968b3eba7ddd0028e330312515f7abd36d56be1552c4264268d5c930601010ec36db86ed424e2a2778366b25f6899ad05857b63b680b72d56f60862d1611a66f08951c0e2eae8cf3372a7a388ee7600a7dce4b0e68f852d38777520acc1902d826579e8f494c94d5148070ed677bbcfa44155baa76ab48a9e68b33d79a35d342cc62aaf007abd4ec09e0cfc6dd1bced645ef0d906c68efe2dfb02704826266d52909051572c4fc2c072d818627dbc8c1c0bb83ce685087036027dd768a25ef1bb35c9a74ac161ba8bddd799ffe2e794bc9b6a64e7ea2c7a2746d5669b83dd2c6e8126a8eaf937792bc5b107ca270ad90502c45881e9189934d339b48d54a7d6277f3aed45607eeb1f9ebf077c6d4b3929d65ac6f0f28b2b73f6b4b6f9fc2dc3b94ceee70f0590252bdbd6b9fdc0e82166dbdd6458b65e424b3ef0145eb5bef17fdcb0cde38914ff243a08149868a5eeea0b00a17528db7d018baffdaa26fba4d99b98f98b1a2505cc7d85e87513e1e50ca53a5725c67629bdacc52d296446c88810b3c3474dc498a3f5121bdee012f58cc8c162436e483245c5d1b5af7ed97c5317bd71bfabe71bb57c73b732c0afd8de30ef47d74cd4b4e81b71c695a913fff56ca12f7b9ce4d09fde91e68d6c73070c28f99736a20504d0a669a8c42eff73e2e9aa92027ba08458146f538e537485baccf3746e00eafa2b735c6889ea8191d88cafffe292d5d36c2c7a4ae1f9b3a84ce5f7ceae9fa841599f11a88982c6f5c8b79ab1116c4b8d970bc4c0fcda30ed59aca8e85d2ba8b2bb9ead2d5b47639a7baaa1b774607533c77967f6f05f4e38e4dddca5fb4acdbf7f431c5aaef00abf579df6b88f552b69a0149df14d24d4327a458cee15cd8e5b9329009be98622a552b5041e7c1868edbd246f2485b3014c5e03846a440e6b1b9ebc67e38ce957137eee99b45d3c3d8bb4fd695aa4158f815947c8a40144d91f833aad1078d2fe223e4829e3ec908a25fcff1a484e5168c8315b17488a30178339530c1b99ea909fdd36c7fa01e3e0c5a2eda2d78a810c63d2d3c2a1589179de7f6a94a789b4b0d7265b2e5a90bdc3bb7d038bcee646669dad90c98674fb030bd5da03e2fd40fb6eee168d4280004a241f3139119b61177381231c729b3dd662c46c725054d9f6af6e705593e18494c4887c9667445620689d400333909cf9aa16f13df54ba83575a81fbb12066a25ed4e2e4a98b7fa292495a264e7bb0a709f5064cb97fd7ae89d7f693c8bf3b5f2aa2769e30e5cd1a7898120195cc4ca6aa41cbd38bdda34b471290ec167f3590d9f55a6c0f04c22d8311e8f900edd38a93f0764eb0381afba692ce23153ce265aa58d191312345ac7fac7789f4faa52ca47d2c21c33bc8529f0e8f51e6e865ed8cb785b7edafbbce02d689ea90b685a26268b74a3425653fd5f7b9045725d3fad2f4ae311c778298d9f181592f5976562bbc6eeca11780a366bfa4eb0452369cba2da77c0814f60580787e7a", 0x1000, 0xffffffffffffffff) r2 = add_key(&(0x7f0000001300)='logon\x00', &(0x7f0000001340)={'syz', 0x2}, &(0x7f0000001380)="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", 0x1000, 0xfffffffffffffffd) add_key(&(0x7f00000023c0)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="01e311e0a4bd8b8517fb7e212d476bb35a069e8643d96ad4e95ec986b6336a7a45af60a4d8ae3fc3d6b2195463a2c89bd6e784b7ffbdace66a0d5d1a536abf5897", 0x41, r2) r3 = dup(r0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000002380)='nbd\x00') r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000024c0)='/dev/zero\x00', 0x2, 0x0) r6 = syz_open_dev$sndpcmp(&(0x7f0000002500)='/dev/snd/pcmC#D#p\x00', 0x400, 0x301002) r7 = creat(&(0x7f0000002540)='./file0\x00', 0x0) ppoll(&(0x7f0000002580)=[{r3, 0x2000}, {r5, 0x10}, {r0, 0x1000}], 0x3, &(0x7f00000025c0)={0x77359400}, &(0x7f0000002600)={0x8}, 0x8) pipe(&(0x7f0000002640)={0xffffffffffffffff}) r9 = syz_open_dev$mice(&(0x7f0000002680)='/dev/input/mice\x00', 0x0, 0x2000) r10 = openat$null(0xffffffffffffff9c, &(0x7f00000026c0)='/dev/null\x00', 0x80000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000002800)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000027c0)={&(0x7f0000002700)={0x8c, r4, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfff}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 23:52:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='new ', 0xfffffffffffffffa) add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="46ba80fae8286149ac16d7e90a2de06d931ff57ee91e153471da643312f3bb08dc857401b15794fcb6251bafbc9321a46b58f80e01c82954d3ab28395d482ecccdc222736877fbaf0425c9da", 0x4c, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:12 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:12 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:12 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'.yz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:12 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40) timerfd_settime(r0, 0x1, &(0x7f00000000c0)={{0x77359400}, {0x77359400}}, &(0x7f00000001c0)) r1 = socket$isdn_base(0x22, 0x3, 0x0) connect(r1, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x1, @broadcast, 'dummy0\x00'}}, 0x80) 23:52:12 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:12 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:13 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2d, 'm\x00\x00om&\xc9\xcc!\xd4Y'}]}, 0xffffffffffffffc2) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r1) 23:52:13 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:13 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:13 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r1}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000000080)={0x1f, 0x0, 0x3, 0x9}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0086438, &(0x7f00000000c0)={0x3, r2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xc95, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a52cdd4b8303030303030303030010000003030303430393600"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='newault user:syz 00000000M00000004096\x00\x00\x00\x00\x00'], 0xfffffffffffffc48, 0x0) 23:52:13 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = shmget(0x1, 0x4000, 0x1000, &(0x7f0000ffb000/0x4000)=nil) shmat(r2, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 23:52:13 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:13 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:13 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:13 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:13 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:13 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x9}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:13 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:13 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) readahead(r1, 0x5, 0x5) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:13 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) [ 308.210202][T20575] encrypted_key: keylen parameter is missing 23:52:13 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x9, 0x2, 0xc50c, 0x4000000000000000, 0x0, 0x7, 0x4000, 0xa, 0x4, 0x8, 0x2, 0x7, 0x603, 0x1ff, 0x0, 0x2, 0x7, 0x4, 0xffff, 0x5, 0x62d47384, 0x5, 0x9, 0x7f, 0x8, 0x1, 0x77, 0xff, 0x200, 0x4, 0xa0ed, 0x1, 0x7ff, 0xffff, 0x9, 0x4, 0x0, 0x5, 0x2, @perf_config_ext={0x88e, 0x8}, 0x40c0, 0x200, 0x1f, 0x9, 0x14, 0x8, 0x1}, r1, 0x6, r0, 0x2) 23:52:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) dup(r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$inet6_tcp(0xa, 0x1, 0x0) 23:52:14 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r1, 0x6431) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x404000, 0x0) ioctl$TCFLSH(r3, 0x540b, 0xffffffffffffffff) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:14 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:14 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffb000/0x2000)=nil) ioctl$RTC_VL_CLR(r0, 0x7014) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x1}}, 0x18) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000300)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000280)="9369a6172ab49b9bfea0b8496626b94404a5419f6956b1bb4031fa047550ad2cbc6e03153eb6fd71993c64a058143480d43325f3c41bb6c78f5d8dd6910998df50550237e93242440992f2c42a82ad5a572fa480e24ee889855c004344820d758f681a46a98b252757a269b8c1ba464f30a6", 0x72, 0xfffffffffffffffe) 23:52:14 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) [ 308.419250][T20598] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:14 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000000c0)) add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)="63e35db35cf3073988328f069cb5a9009358248585ef4192a9dc835e31164b2f98ffb9343608ee8c2f0990e084c4b9f6c15a6325499fb50edd55f740e29dd6e52881056111753fdbb10f0ade7786f8e54cd12606d8620cc1e79419bf26f369f435a9406b7985cf2db4ef032ea1b18c49731b558bd603649e1546c73bd1a69c3518816b6be62961f3d6a13b9792d4e66df0e920609b7ad1ba1619f09c29f2f2911f7a6d0c", 0xffffffffffffff5e, 0xfffffffffffffffe) 23:52:14 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:14 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="2b6d656d06007920"], 0x8) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffffe, 0x24000) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f0000000100)={0x1, 0x1, @stop_pts=0x8000}) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000080)=0x3, &(0x7f00000001c0)=0xfffffeb1) 23:52:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:14 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:14 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x300}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 308.632888][T20614] encrypted_key: master key parameter 'ßPU7é2BD' is invalid 23:52:14 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x660, 0x100) timerfd_settime(r1, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:14 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 308.750473][T20634] encrypted_key: insufficient parameters specified 23:52:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x7ffffffffffc, 0x8, 0x1000, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x20000000000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000000), 0x0, 0xfffffffffffffffe) 23:52:14 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:14 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x900}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 308.838375][T20645] encrypted_key: insufficient parameters specified 23:52:14 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1, 0x200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000140)={r1, r2/1000+10000}, 0x8) r3 = openat$cgroup_subtree(r0, &(0x7f0000000280)='cgroup.subtree_control\x00', 0x2, 0x0) acct(&(0x7f0000000380)='./file0\x00') write$cgroup_subtree(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x11) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r4, 0xc0905664, &(0x7f0000000180)={0x0, 0x0, [], @raw_data=[0x10000, 0x6, 0x7, 0x7, 0x200000000000000, 0x5, 0x1, 0x8cb, 0x3, 0x86, 0x618c000000, 0x663, 0x1000, 0x2, 0x1f, 0x1000, 0x2, 0x3a22, 0x2, 0x77, 0x8992, 0x4d, 0x6, 0x1000, 0x20, 0x1, 0x8001, 0x5, 0x6bdd, 0x80, 0x2, 0x1]}) 23:52:14 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e657720e4656661756c7420ff7365723a73797a60303030303030303030308a263030303034303936000098d42e2fcf3e40fc14bb1b1375f71e023f6252ea6b1173b574e523f490486d08e3df78fcfc8e60aaaf49e1de3ee593750e883c074e0cd30e99e3b609b4d653ea37cb33f34c4701d6c9"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:14 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:14 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:14 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x400, 0x100) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x420000, 0x0) r3 = openat(r2, &(0x7f0000000100)='./file0\x00', 0x2000000000040, 0x104) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f0000000080)='./cgroup\x00') write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='+memors '], 0x8) 23:52:14 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 309.043149][T20672] encrypted_key: insufficient parameters specified 23:52:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) mq_timedsend(r0, &(0x7f0000000040)="78bf92db4c9ea6e0de23a4ada8a623ef238c7c46e87b61c04ecaa4ef825c8ff325d116e5592e088aa60c4f08d767e3de4b51369f4bdb2d7b12de99ed5eaac6bc3a7cb474f68148edfdcdccb783684950889dd4c42bd8d12e85637f3737e502fefe2c5bc31ac01918bb64588538bc1520c4bca9d68e75696e", 0x78, 0x9, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = request_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='-\x00', 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000240)={r1, 0x65, 0x1e}, 0x0, &(0x7f0000000280)="b283c6015270b85fe1d6f8a986431be9201866533f1ceae044e6538f93bf327c8c5246050945a7d6475762c80ad4bf6af126b768fdc966275e025287e5be71e0139f3956cdfa636a14be24ccb6fc4064285db448397738c4a4d850040b36d727f4b6c6db2d", &(0x7f0000000300)=""/30) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:14 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:14 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064656661756c7434757365723a737930303f30302030303430393600cd762ad13a218f38ae824784be83dbd39ed326bcbd0161e75160c63674089c4f82c5514fb54f1d29cf2fb672f8bdcd400c5437749fc74dcdeca37500"/117], 0xfffffffffffffc48, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000280)={0x77359400}, 0x8) r2 = add_key(&(0x7f00000000c0)='iexacy\x00\x00\x00\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f00000001c0)="4fa61e7e31590b1aecf3515e9d764ab7f793d28c9af904d7ff7629e0e40f9a933088e8a66418bf4e1337e3eedafc31b9", 0x30, 0xfffffffffffffff8) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000140)={0x401, 0x9, 0x1ff}) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000200)="6d83e553f574f0eaf0eddf530193a3bfd1a05174b20c4374723a8eeb67390280a8ba0a9a1c2d6d80e8", 0x29, r2) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000002c0)={0x400, 0x6, 0x8001, 0x6}, 0x8) 23:52:14 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:14 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:14 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1f00000000000008"], 0x8) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x41, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r3, 0x400, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x50}, 0x40010) 23:52:14 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='syz', 0xfffffffffffffffb) r0 = add_key(&(0x7f00000000c0)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000100), 0x0, r0) 23:52:15 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000780)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f00000007c0)={0x1, 0x0, [{}]}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = shmget(0x2, 0x4000, 0x1000, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_RMID(r1, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) fsconfig$FSCONFIG_SET_BINARY(r2, 0x2, &(0x7f0000000680)='HMARK\x00', &(0x7f00000006c0)="d9a2587573ac9537901b915c2e177608339c6f15162da17b48140bf42ecad3c27cf3970e0b0bca627ce78a8a24555a5ccd27ac1050849d7db5ea28a965193e89ff2442cf0020d39a7a5b6824601dba6824f879ac3dc3f58138b81d512ae52ab049ef62a61ae4f593378a7bb13058d7ba9b41845c450cfbf33bdaed5d7b286d015772d284aab6738cdaf8c2ac0e93bf1c59ed7a0f05644a4710401d553177afa383c4aa0a0c7a2daecab9e14c55b0f5704bb981331dbc889896e1e8", 0xbb) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0086401, &(0x7f0000000080)={0x30, &(0x7f0000000040)=""/48}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000001c0)=@security={'security\x00', 0xe, 0x4, 0x434, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x2a8, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x4, &(0x7f00000000c0), {[{{@ip={@loopback, @multicast1, 0xff000000, 0xff0000ff, 'ip6gre0\x00', 'gretap0\x00', {}, {}, 0x5c, 0x1, 0x4}, 0x0, 0x114, 0x170, 0x0, {}, [@common=@inet=@udp={0x2c, 'udp\x00', 0x0, {0x4e22, 0x4e20, 0x4e20, 0x4e22, 0x1}}, @common=@osf={0x50, 'osf\x00', 0x0, {'syz0\x00', 0x1, 0x0, 0x2, 0x2}}]}, @common=@inet=@HMARK={0x5c, 'HMARK\x00', 0x0, {@ipv6=@initdev={0xfe, 0x88, [], 0xfffffffffffffffa, 0x0}, [0xffffffff, 0xff000000, 0xff000000, 0xffffffff], 0x4e24, 0x4e23, 0x4e20, 0x4e21, 0x0, 0x80000001, 0x40, 0x80000000, 0x7}}}, {{@ip={@multicast1, @multicast1, 0xffffffff, 0xffffffff, 'teql0\x00', 'bond0\x00', {0xff}, {}, 0x2f, 0x3, 0x40}, 0x0, 0xdc, 0x138, 0x0, {}, [@common=@ttl={0x24, 'ttl\x00', 0x0, {0x1, 0xdc8}}, @common=@socket0={0x20, 'socket\x00'}]}, @common=@CLUSTERIP={0x5c, 'CLUSTERIP\x00', 0x0, {0x0, @local, 0x80000001, 0xa, [0x1e, 0x1f, 0x1, 0x32, 0x3, 0x20, 0x23, 0x8, 0x0, 0x1f, 0x40, 0x2f, 0x29, 0x9, 0x5, 0x2], 0x2, 0x2, 0x2}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x3ff, [0x7, 0x1, 0x100000000, 0x10000, 0x1, 0x3d9], 0x100, 0xc000000000}, {0x0, [0xfffffffffffffffe, 0x4, 0x6, 0x6, 0x0, 0x81], 0x7f, 0x4}}}}], {{[], 0x0, 0x70, 0x94}, {0x24}}}}, 0x490) 23:52:15 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:15 executing program 0: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[], 0x0) 23:52:15 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='clear_refs\x00') r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f0000000080)='comm\x00') exit(0x0) sendfile(r2, r4, 0x0, 0x1) keyctl$instantiate(0xc, r1, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:15 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) [ 309.549918][T20721] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:15 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:15 executing program 0: setxattr$security_smack_entry(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.SMACK64MMAP\x00', &(0x7f0000000280)='cgroup.subtree_control\x00', 0x17, 0x1) r0 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x80, 0x58200) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000380)={0x8a, 0x100000001, 0x6030fad0, "076434912f60169940be17603fd2cd95848890e73ec86af1522514374e76a38ff45b71ecdd1deca7403dac0756aec5e245eb219d03a28b39f4339c6c2c5cabb9cb588b4bcb5d07772da1f61bb08a03991c87fe2d6bc59e4d5a4eb6d085f39eb6d7ca5e502f06ec2c0ccf9958527902c40e4a942c50bda9f8ea1b928f046ad876d71ce0c6bfb0f26e34e4"}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = socket$packet(0x11, 0x20000000002, 0x300) getsockopt$packet_buf(r2, 0x107, 0x11, 0x0, &(0x7f0000000180)) r3 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f0000000100)="893c3f58f0efe82c1acaa2135d52728eb21e64d7205a71e4b15c4ad514d48d29c04ece9bd596f1b8b1fb3eee8f76265c0d1d52b643cb9116e4331e5c80482c646a9a9aaaf842243f04c518cd948bb5c303e5feb8cf2ef2168071b2ff629005e722d5103f37") r4 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000002c0)) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="55748d9e19402520"], 0x8) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f00000001c0)=0x10) 23:52:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65771c64656661896c7420757342c23a73797a2030303051303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) r0 = request_key(&(0x7f0000001200)='keyring\x00', &(0x7f0000001240)={'syz', 0x2}, &(0x7f0000001280)='lo(nodev\x00', 0xfffffffffffffff8) r1 = request_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f00000011c0)='proc\x00', r0) add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000001c0)="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", 0x1000, r1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:15 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:15 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfeffff}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:15 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 309.775469][T20752] encrypted_key: master key parameter 'usBÂ:syz' is invalid 23:52:15 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x100) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0xf, 0xffffffffffff0001, 0x50d, 0x9}, 0x10) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:15 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0xc0) write$apparmor_current(r2, &(0x7f0000000200)=@profile={'changeprofile ', 'em1\x00'}, 0x12) bind$isdn_base(r2, &(0x7f0000000080)={0x22, 0x2, 0x7, 0x7fff, 0x28}, 0x6) getpeername$unix(r2, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e21, @loopback}}}, &(0x7f0000000300)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000340)={r3, 0x3ff}, 0x8) 23:52:15 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$MON_IOCH_MFLUSH(r1, 0x9208, 0x6) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new defau}t user:syz 00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) fcntl$setlease(r0, 0x400, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000040)=0x80000001) ioctl$MON_IOCQ_RING_SIZE(r3, 0x9205) 23:52:16 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:16 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x1000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:16 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='+memoRy '], 0x8) 23:52:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000040)={0x2, 0xffffffffffffffff, 0x1}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:16 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:16 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x2180, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = signalfd(r0, &(0x7f0000000140)={0xf4ac00000000000}, 0x8) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x9, 0x6, 0x20}) r3 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0), 0x0) 23:52:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, r0, &(0x7f0000000000)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', '\'^ppp0', 0x20, 0x7f}, 0x396, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 310.661381][T20806] encrypted_key: master key parameter 'defau}t' is invalid 23:52:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000540)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000005c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r3, 0x2}}, 0x18) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000600)=0x1, 0x4) getsockopt$packet_int(r2, 0x107, 0x1c, &(0x7f0000000780), &(0x7f00000007c0)=0x4) r4 = socket(0xd, 0x800, 0x2) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x150, r5, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x16}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}]}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @empty}}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x21}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xc37a}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7c}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x20}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x150}, 0x1, 0x0, 0x0, 0x8010}, 0x4001) name_to_handle_at(r1, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x94, 0x7fffffff, "394bf31b928902503eabf12da58d3244acd7e4d22876a7577487b56a6d43a36d8fd8ff8b6d5f335b1984ec4c98c66a3121791097faa20f3fb278b4e7965bfff5f519e960ac9fbb0ec1913d34f2e7d6ba4d4c59beb27163bd194e567e3e20dd4bbd7d7262aa0a4733d35b87ed5857147545337e3804a24d4a54280aa5d1503866305bb38b4d5aad96f7974c0d"}, &(0x7f0000000740), 0x400) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:16 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) [ 310.734722][T20806] encrypted_key: master key parameter 'defau}t' is invalid 23:52:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f00000002c0)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0x202, 0x4000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') connect$rds(r0, &(0x7f0000000300)={0x2, 0x4e22, @multicast2}, 0x10) ioctl$FS_IOC_GETFLAGS(r1, 0x80046601, &(0x7f0000000000)) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x4c, r2, 0x300, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x48004) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:16 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:16 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:16 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) [ 310.882164][T20825] encrypted_key: insufficient parameters specified 23:52:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:16 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) [ 310.962432][T20835] encrypted_key: insufficient parameters specified 23:52:16 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) ioctl$void(r0, 0xc0045878) keyctl$instantiate(0xc, r1, &(0x7f0000000080)=ANY=[], 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:16 executing program 4: lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:sysfs_t:s0\x00', 0x1d, 0x3) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xeb10, 0x6}, 0x0, 0x0, 0x0, 0xf}, r1, 0x0, r0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:16 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:16 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8bc, 0x101000) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:16 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) [ 311.183667][T20862] encrypted_key: insufficient parameters specified 23:52:16 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000280)={0x6, 0x0, 0x4, 0xfffffffffffff36d, 0x0, 0x100000000}) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='syz', 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="b8034a98752c4d890de8", 0xa, 0xfffffffffffffffc) keyctl$instantiate(0xc, r1, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 23:52:16 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:16 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 23:52:16 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x9000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = dup(r1) write$FUSE_IOCTL(r2, &(0x7f0000000100)={0x20, 0x0, 0x2, {0x1, 0x0, 0x2b3f, 0xfffffffffffffffa}}, 0x20) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200082, 0x0) setsockopt$bt_BT_SNDMTU(r3, 0x112, 0xc, &(0x7f0000000080)=0x1, 0x2) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x8) 23:52:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) set_tid_address(&(0x7f0000000000)) 23:52:17 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget(0x0, 0xc000, 0x2, &(0x7f0000ff4000/0xc000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000200)=""/34) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, r1, &(0x7f0000000240)=ANY=[@ANYBLOB="6c6f7573656a3edd55187cb1203030303030303030303032713437343833f5d161c2dbaec16b1cbfb8f23c5b3efd23c1a5db7d82c5f44c98f36a27481e6d8237812d6ba9fd"], 0x33, r2) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x4, 0x1, 0xab9}, {0x0, 0xffffffff, 0x401, 0xb79}, {0x1, 0x9, 0x6, 0x400000000000000}, {0xffffffffffffff28, 0xffffffffffff0001, 0x7, 0x100000001}, {0x219, 0x7, 0xfffffffffffffff7, 0xa91}, {0x1, 0xb, 0x0, 0x61}, {0x7fff, 0x6, 0x100000001, 0x3}, {0x404, 0x7, 0x5, 0x4}, {0xc400000000000000, 0x6, 0x1, 0x2}]}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400240}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x11}, 0x40000) bind$alg(r1, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) write$P9_RAUTH(0xffffffffffffffff, &(0x7f0000000700)={0x14, 0x67, 0x1, {0x0, 0x1, 0x7}}, 0x14) r2 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r2, 0xc0405665, &(0x7f0000000240)={0x0, 0x5}) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x48000) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:17 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:17 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40080, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0xfff, @empty, 0x3c1d}, 0x1c) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:17 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:17 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000200)=r2) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 23:52:17 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\xbe\x18yz1\x00E\xc7P\xfe\x18\xd4\x851_\x88u\xe8D\xe4\xe2^ \x92\x88I\x00\xf04d=\x18\xb3\xf7\xd0\xe9\xa8\x01n\x1e\xe2<\xfa\x8f\xc9\xe8\x8a0&\xcaK\t&isl,\xb6xrw\x91\x91^\xdcEZ\x84-\x84N\x0f\xd4\a\xc7FJUzPF\x8a\x8d\xb6\x91\x19m\xb4W\xb0>\xc1P\xde(\x16\x96\x8d\xfe\x89U\x12.\x94\xb5\xa1\x97\xea\r\x06\xbcC\x10\x1d\xc7\xab\x1f\xb6\xc7@McR0\\\xf7eK\x9a\x7f\xe7\x94\x98\x9f/\xa8\xa8\xee\xf1\xc0w\xe2\xcfG\xc0\xe6\x1d\x96\xfb\xc1\x0fH\x0e\xfc\xcf\xa2\'\bt\x1b@\x91qT\xc8$ImVS@*m#\xb5\xcf\xf0 @=\x81#\xe4(\xdb\xb5\x199\xea\xab\xdb\f\x9dCyb\xc3b\xdb\xcf\xf1\xbb\x82}\xd2\xe2\f\xca', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x8) r2 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0xfffffffffffffffc, 0x8000) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000480)={0x6, 0xfffffffffffffffd}) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000280)={[0x6, 0xfffffffffffffffa, 0x6207, 0x0, 0x80000000000000, 0x8, 0xffff, 0x2, 0xfffffffffffffff9, 0x788c, 0x7, 0x81, 0x8, 0x101, 0x9, 0x6]}) fallocate(r1, 0x41, 0x4, 0xb7) fanotify_mark(r3, 0x20, 0x10, r2, &(0x7f0000000180)='./file0\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='1\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="08002cbd7000fcdbb289731da34dbc9bbe7100"/35], 0x30}, 0x1, 0x0, 0x0, 0x40001}, 0x4) 23:52:17 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:17 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x80000, 0x40) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000200)={0x0, 0x400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6e65772064656661b3e74828757365723a174030303030394fd8a44b804168000065768e0856a0fb8ecf559b49fac6db3a02c2bab992fe9c35351cdf28dd0587f163d6552693a62c59854aa9545add8851b856cde7ae612d51e73c384417cfc733f79fc22b"], 0xfffffffffffffc48, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={r2, 0x8}, 0x8) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) signalfd4(r1, &(0x7f0000000100)={0x6}, 0x8, 0x80800) 23:52:17 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:17 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:17 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x40000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 311.967209][T20956] encrypted_key: insufficient parameters specified [ 311.976334][T20953] encrypted_key: keyword 'new' not allowed when called from .update method [ 311.995098][T20956] encrypted_key: insufficient parameters specified 23:52:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40186417, &(0x7f0000000040)={0x4, 0x94, 0x3, 0x10000, 0x4, 0x43e}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x175) r2 = dup2(r0, r1) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000000)={0x23, 0x2c, 0x15, 0x12, 0xa, 0x1, 0x4, 0xc4, 0xffffffffffffffff}) 23:52:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 00000008000000004096\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:17 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:17 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:17 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfffffe00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_config_ext={0xb5a6, 0x4}, 0x20040}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1e3, 0xfffffffffffffffe) msync(&(0x7f0000fec000/0x13000)=nil, 0x13000, 0x6) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x500, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x101, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080)={0x3be6}, 0x4) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040)={0xa, 0x8, 0x4, 0x7}, 0xa) 23:52:17 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='9\x00ry \x00\x00\x00'], 0x8) 23:52:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 23:52:17 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000001c0)={r1, r2}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nullb0\x00', 0x40000, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r3, 0xc0086421, &(0x7f0000000080)={r4, 0x1}) 23:52:18 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfeffff00000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)="66572eae3792c9993d3f015d8c9917f378e9416d0bb43c5e0b17411af57d9a6d7af9789b9af66f12e0f1ef59af01c95d56d1447040a8e43afee98d8b", 0x3c, 0xfffffffffffffffb) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$unlink(0x9, r2, r3) 23:52:18 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x488000, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000040)=""/40) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:18 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:18 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:18 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0x94500) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000280)=0x2, 0x4) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f0000000000)={0x20, 0x3, 0x200, 0x4, 0x81}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="686d65ae170ccc43dfca2f9694770a4b898d28e49fce919120000052d3d3e80000000000000000"], 0x1f) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f00000001c0)=""/84) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2b6d656d6f7279201e9ec87395424c41a454b76e4feff5e12f83fbabc921cbc6540107d415f2fc258c8f7ee3f8dc23e3b555d04bd64203b2966e2d994a99f9fbf2e90fa5643f443a1826a146b832618c9e44407f73b68af335"], 0x8) 23:52:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xa389, 0xc000) ioctl$MON_IOCX_GET(r0, 0x400c9206, &(0x7f0000000080)={&(0x7f0000000040), &(0x7f00000001c0)=""/214, 0xd6}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000300)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 23:52:18 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x100000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:18 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:18 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:18 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)='-wlan0&\x00'}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="a02b3bf983a15093829b", 0xa, 0xffffffffffffffff) keyctl$instantiate(0xc, r1, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:18 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb0, r3, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x14}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xffffffffffffff50}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4000}, 0x4010) r4 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x82000) symlinkat(&(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000100)='./file0\x00') write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6577200600000000000000757365723a73797a2030303030303030303030303030303030343039360053788adea9e3d3b2cf5f6f188bc33c5a5a13645a90a778e50c1f4cebdc211200454f284443c6c3ac93078158afb3b055f4f92d980100a3973add0d5c4c28aa7cf43209eb85575270d830a7e662a2c3bc8b66392f00"/138], 0xfffffffffffffc48, 0x0) poll(&(0x7f0000000000)=[{r0, 0x1000}, {r0, 0x100}, {r0, 0x2000}], 0x1, 0x6) io_uring_setup(0x69a, &(0x7f00000001c0)={0x0, 0x0, 0x4, 0x2, 0x96}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:18 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x200000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:18 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:18 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) socket(0x0, 0x80002, 0x2) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="07afd67d8497e2897e94e514a8dc15d5277e1bed7864b23ef01ce30272631883af044aa18642cec5cd14d722150d7cf680b4d3eb4e48b7ae283abc19f75ecb55de8a48264dab2b370aa37c368a1493e0fca8ec15d271fb5553a3f866cf600c"], 0x8) [ 312.929737][T21068] encrypted_key: insufficient parameters specified 23:52:18 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c74207573657a3a73797a203030303030c90d64f2ced530303030303030303030"], 0xfffffffffffffc48, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x400, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000200)=0x6) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x800) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000040)) [ 312.980316][T21075] encrypted_key: insufficient parameters specified 23:52:18 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:18 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default u]er:syz 00000P00000&00004096\x00'], 0xfffffffffffffc48, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000140)) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000001c0)=0x1) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000040)="dbdfaa2dd9c16991534ecee14a9deead42c187b9017b4399f7e79769f7355f9fbe4c0b8912ea46ec023b8fb6cd384835db3ca22ff337aa7c16a2df87c15e000000d1000000", 0x45, 0xfffffffffffffffe) [ 313.061120][T21085] encrypted_key: master key parameter 'usez:syz' is invalid 23:52:18 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x300000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 313.110821][T21085] encrypted_key: master key parameter 'usez:syz' is invalid 23:52:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) timer_create(0x3, &(0x7f0000000000)={0x0, 0x30, 0x1}, &(0x7f0000000040)=0x0) timer_gettime(r0, &(0x7f0000000080)) r1 = accept4$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f00000000c0)=0x6e, 0x80000) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000240)=@generic={0x0, 0x0, 0xbb}) 23:52:18 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:18 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:18 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f0000000140)='threaded\x00', 0x9) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="a694c31e23362e1e"], 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/60) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000240)=""/157, &(0x7f00000000c0)=0x9d) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000200)) [ 313.231326][T21103] encrypted_key: insufficient parameters specified 23:52:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85, 0x2, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = getpgid(r0) ptrace$peekuser(0x3, r1, 0x2f) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 00000000000000004097\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:18 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x900000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:19 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4004240b, &(0x7f0000000000)={0x5, 0x70, 0x7fff, 0x2, 0x7, 0x2, 0x0, 0x9, 0x200, 0x4, 0x4bdd, 0x9, 0x401, 0x9, 0x7, 0x2, 0x0, 0x10001, 0x4, 0x9, 0x8, 0x3f, 0x969, 0xb119, 0xe7, 0x7fffffff, 0x219f400000000000, 0x5, 0x6, 0x5, 0x4, 0x6, 0x22f5, 0x7fffffff, 0x200, 0x9, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_config_ext={0xfffffffffffffeff, 0x9}, 0x2, 0x8000, 0x0, 0x7, 0x8, 0x5, 0x1f}) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$nbd(r2, &(0x7f0000000300)={0x67446698, 0x0, 0x2, 0x3, 0x2, "d94601baa6ab65139686aea7cb234e6dc47d1f0a2bc1e92e"}, 0x28) keyctl$describe(0x6, r1, &(0x7f00000001c0)=""/208, 0xd0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x28400, 0x0) r3 = msgget(0x3, 0x0) msgctl$IPC_STAT(r3, 0x2, &(0x7f00000001c0)=""/159) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000100)) 23:52:19 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:19 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = gettid() ptrace$peek(0x1, r2, &(0x7f0000000040)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6577206465303030360000000000000000ffffffffffffff000000000095087ae11daa15abd375"], 0xfffffffffffffc48, 0x0) sendto$inet(r1, &(0x7f00000001c0)="c94d1e484ab6437c92e1706696fd64b15952fe68a5f5fe22ddb3b6fd562f3fa70a392fa6d3e9324bac6036a4166fa50117336d0fa088b9d269fbb7afefdbfdac978409b613669fe9b109a75e09675c450b8efd685f945085a77c34c6cc7a5fd084a5038bf9edb36e63420347d0c868f52905cddca9502ab734b0058d4c888f0af241b4905d0bb861f95015f5dcfed551716c03223439dc96926b543a49dc100ee28804509f632acba97f56487d34a1d9540f49c2b47fe6c8dbff11dcc4105398317c70685edafd23ca31ebe236f942cad361578cf303c6001768a21cafbf191f7e5254866b30945b58d6b0fa11c05ddf488fef75ab8a5c9266", 0xf9, 0x800, &(0x7f0000000080)={0x2, 0x4e23, @empty}, 0x10) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x301400, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:19 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000000)={0x0, 0xa7b, 0x682, 0x0, 0x81, 0x8}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x100, 0x4}, &(0x7f0000000140)=0x8) 23:52:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0xa4000, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000040)) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) 23:52:19 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:19 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa00000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 313.651110][T21148] encrypted_key: master key parameter 'de0006' is invalid 23:52:19 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) [ 313.703606][T21159] encrypted_key: master key parameter 'de0006' is invalid 23:52:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYRES64=r1], 0x8) ioctl$int_in(r0, 0x0, &(0x7f0000000000)=0x26) 23:52:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f00000001c0)={0x0, 0xfffffffffffffffa, 0xffffffff, &(0x7f00000000c0)=0x8}) keyctl$instantiate(0xc, r0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:19 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:19 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:19 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x200000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) write$UHID_INPUT2(r1, &(0x7f00000001c0)={0xc, 0x1000, "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"}, 0x1006) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 23:52:19 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f00000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80100, 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) r2 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0xb, 'memory'}]}, 0x8) 23:52:19 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:19 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new :syz 00000000000000004096\x00'/42], 0xfffffffffffffc48, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x8001) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000080)={'nat\x00', 0x0, 0x3, 0xd2, [], 0x1, &(0x7f0000000040)=[{}], &(0x7f00000001c0)=""/210}, &(0x7f00000002c0)=0x50) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = getegid() lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, r2) 23:52:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x400) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x9, 0x2) connect$tipc(r1, &(0x7f0000000380)=@id={0x1e, 0x3, 0x3, {0x4e21, 0x4}}, 0xb) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000200)={0x7, 0x7, 0x0, 0x0, 0x0, [], [], [], 0x5, 0x8}) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x80000000, 0x100) sendto$unix(r2, &(0x7f0000000040)="58ad61f70bcf39f5cbbcb66f9162a753882355d026716fe22b8964cbc725ac5062daa7a74bd1a37927fa", 0x2a, 0x80, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 23:52:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./\x06group.\r\x18\x05\x9dO\x9d\x93{nq\xe7kdP\x19y\xd3\xe2\x8ax\xba;\x06\xb5\xef\xb2\x9c\xa8\xd7J\xbeb7\xf5\xc0&g\x9aV\x86\xb5\xe9\xca\f\xaa\xda\x06l?0\xa2\xc2\xc2\xfe\x00\x00\x00\x00\x00\x00\x00R\xcb\r\xd0\f\xc2\xac\x0e\xady\xfa\nf\x90\x99\x88\xd4\xc2\x86\x1cl\xa6A\x1e:\x90\x03\x1bFxs\xe4\xe5\xf4\x06g\xe1\xf5\x12\xd4(\xa57\x84pKt\xe9A\x0e\x99\xf7I\x84\xdd(u\x80T\rV\xc5\xd5b\xa1\xbbpEA\x1e\x82\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xb9\x8a\xfd\xf4\xa32L\xd0u\xc4\x8d\x81\xe8\x10\x9b\xcf*Vgf\x81R|+\x1b5\xff\xf87y\xc8\x94\xe2q\xa6\xca\xbb\xfe\xf3l\x1f\x1d\x00\xd9\xff\xca\x8b\xd5\x80\x95+\xd1\f\xe4\x9fz/\xbeK5y\xddC\xa8f#\xf6\xea\x88\x89\xc0\xe55\xf9\x0f\xae\xb4\x11.\xbd\xeb\\me\x18\xf4\x04\x89\x87\x03\x02\x85)\x8dk$C\xed>\xfb\x0f\xe0\xa6\xf3\b\xed\x99\x85\xc1K\xf07\xa8a,\xc1\x13\xc8\xc6\xd3\xaa\a@nt\xaf\xec\x98\x82\xf0\x8f3\xe6\xeblB9\xa6\xdd_\xef\xd2\xb4\xe4\x1e\x9f\xe8\xf8\x93\x93z\xfe\xf8m\x1eR\xb1\x96\x18\x1d\xab\x9d\xae\n\xb4\xeb\xc6\xc0\x13\x11\x10\x1b\xc6,cS\x03y+\x87\x10', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:19 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) [ 314.124354][T21201] encrypted_key: master key parameter ':syz' is invalid 23:52:19 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4000000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:19 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:19 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 314.194001][T21207] encrypted_key: keyword 'new' not allowed when called from .update method [ 314.228602][T21214] encrypted_key: master key parameter ':syz' is invalid 23:52:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x20fc6) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x100000001, 0x123e}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f00000001c0)={0x8, @raw_data="cc13e3f3659c5dadfb2f770f1a3cf852f4b4044a4397e3375e1fb99b474b5ced4c6ceea540ac0f0374e53a2075115956d292d9cb6bb7a34d651856997972035d6ec28bd5cda93f0af71bfc54021ba1ad333bbd876d127e0033c77ff0610645fa7763600d2baef551252fe46ab7d47d61d541a4f44c227241f42bd24caab7bdd180f52b8e83e72806ff7772e91b93d2678e2ac5717e5e0cbacdceb252cbe637beb7560d20b6609ef619c84a9581c37049a7b2ef4ea0053867c5e644a56522f289c736071ca4d8361b"}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) 23:52:19 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:20 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:20 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x200001ca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x200000, 0x0) write$nbd(r0, &(0x7f0000000240)={0x67446698, 0x1, 0x1, 0x1, 0x3, "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"}, 0x10f) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x200000, 0x2) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x7fff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000003c0)=@req={0x20, &(0x7f0000000380)={'lo\x00', @ifru_addrs=@llc={0x1a, 0x32b, 0x1, 0x7fffffff, 0x7, 0x0, @dev={[], 0xb}}}}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e5d6683746c7420757365723a7379303030a430303430393600000088dc000000000000000000"], 0xfffffffffffffc48, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)={0xe, 0x7, 0x1, {{0x1, '!'}, 0x4}}, 0xe) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0xe9, 0x800, 0x7fffffff, 0x9, 0x0, 0x6, 0x5, 0x8, 0x3, 0x10001, 0xfffffffffffffffd}, 0xb) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$read(0x0, &(0x7f00000001c0)=""/41, 0x29) keyctl$instantiate(0xc, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a203030303030303030303030303030303034303936001a485a45347ae24d1994446e2bed86fe4218240c58b99fbee3063ad58985eb105f6e9aded28859"], 0xfffffffffffffc48, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xaee2874ebae2d6df, &(0x7f0000000040)="6ac11820daf8e8cc6f7af5fb7cbe3ceb0aa89d6d77bf653031da4f7713184e7b0b6f1be65ae09786b1756a76a140f565438d4b5601994ff34f96443dea17a89f365169923041a38b5539623066351e919982c27b2b79a72c2200f9c7dddd60c0cac929a4f7bc63c075375ef218fe4359d2c1791e77e9eef61948fc7d5f181d698a8bcbdd2d991dfa8a1b7b56f25e60a86e6dba5b8139b1f4fac42dd14716bad145ba9ba9aab1f763ae76e207d8a8b5c69b4f2e9dc9ea1d45379acf401d", 0xbd) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr\x00') clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) mq_timedreceive(r1, &(0x7f0000000100)=""/78, 0x4e, 0xddf5, &(0x7f00000001c0)={r2, r3+10000000}) r4 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:20 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:20 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$search(0xa, r1, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x2}, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:20 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) [ 314.594794][T21255] encrypted_key: insufficient parameters specified [ 314.609624][T21257] encrypted_key: insufficient parameters specified 23:52:20 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4012000}, 0xc, &(0x7f0000000480)={&(0x7f0000000500)=ANY=[@ANYBLOB="03ee07ec71cde2ee3a9c333ad600a601", @ANYRES16=r3, @ANYBLOB="29072dbd7000ffdbdf250400000010000600080001000000000004000200b00004004c00070008000200000200000800030091000000080002000700000008000400faffffff080001000e0000000800010018000000080001001a000000080003000500000008000200040000005400070008000400020000000800040081ffffff0800020049050000080002000101000008000400ce0000000800030002000000080004002f0000000800040006000000080001000d00000008000300040000000c00010073797a3000000000"], 0xd4}, 0x1, 0x0, 0x0, 0x240408c4}, 0x8000) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r2, 0x8, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20008004}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000002c0)={0x8, 0x2, 0x20, 0xd22e, 'syz1\x00', 0x142}) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='new ', 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000600)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x30, r4, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x80) [ 314.647846][T21254] encrypted_key: insufficient parameters specified 23:52:20 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) [ 314.711444][T21272] encrypted_key: insufficient parameters specified 23:52:20 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000000)) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:20 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:20 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:20 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x3ff) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f00000001c0)=""/214) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 314.839504][T21281] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:20 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:20 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x2, 0x3, [0x6, 0xfffffffeffffffff, 0x8]}, &(0x7f0000000280)=0xe) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000002c0)={0x7fffffff, 0xffffffffffffffff, 0x200, 0x7, 0x5, 0x2, 0x3, 0x4, r1}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000080)={{0xffffffffffffff3e}, {0x3, 0x2}, 0x8, 0x1, 0x8000}) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f00000001c0)) write(r2, &(0x7f0000000100)="8e6ea8c6c5f87d0ba0e8a1847914b7fda978efbbd0d42d98fef957f70ef35beb4f9f21253d06287d416949fa395a234b3de1af23c5ca5a1584a81dcf9e6f2a525e9091738522671919a4ac2dd9342a987b3d2339599a4e484c134e14bd1bf1da589a399d6cfff5f601dc34", 0x6b) 23:52:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661758574205e7303003a73797a303230303030e1690e9a0b450566"], 0xfffffffffffffc48, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:20 executing program 1: pipe(&(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:20 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:20 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x2) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:20 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6d6505000000202b43b38ec347dbce2a2ef8fd9d00a7c83b704521b675c3e3fa06f801012aab82d3ab572cd631c7b15512bc03ec907fab671b3b56f335cdbbf0c87d59dff2d16df5b2cbb6ff2a7ae5ca64b08bb2bf342c4ee1ff590ebc22e66480e0d01c198e84e0a43f67f3186e38025ac9566a8821c2b389589a7dc5f192bc233fe7c5e023fa83a2f805a4b5ed627545e19d42bf660935201b4f1b2a26d24b5b7fcd8e18f201c16d873c671b1648058ab5326035cb98a226e5c44bdeab6f0f86baf6178b09a98e2be3dcb638c5bcd79b4d84e6e93ed0c5b53f"], 0x8) [ 315.152910][T21322] encrypted_key: keyword 'new' not allowed when called from .update method [ 315.165362][T21326] encrypted_key: master key parameter 'defau…t' is invalid 23:52:20 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:20 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2b6d67f7996d7f72f6939de65fa979000000000000"], 0x8) socket$bt_cmtp(0x1f, 0x3, 0x5) 23:52:20 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f00000001c0)="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") add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:20 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'trusted:'}, 0x19, r1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:20 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757362fa2fd2ff14680c3030303030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000000)={0x0, r2, 0x7f}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)={r3, r4}) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x8) socket$unix(0x1, 0x40000000000003, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) 23:52:21 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:21 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) [ 315.391749][T21353] encrypted_key: master key parameter 'trusted:' is invalid 23:52:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10000, 0x0) ioctl$TIOCEXCL(r0, 0x540c) [ 315.468645][T21351] encrypted_key: master key parameter 'usbú/Ň˙h 0000000000000004096' is invalid [ 315.506853][T21362] encrypted_key: master key parameter 'trusted:' is invalid 23:52:21 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000080)={0x2, 'Mg'}, 0x3) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x880, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000040)=0x7fffffff, r1, 0x0, 0x0, 0x1}}, 0x20) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 315.532889][T21368] encrypted_key: master key parameter 'usbú/Ň˙h 0000000000000004096' is invalid 23:52:21 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) [ 315.608784][T21373] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:21 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e65772064656661756cfcc1553efe7420757365723a73793a20303093b8543030303030303030303030303030343039360091e14d45d5932418d1b9980b2f4ed71675d65f3b591215bf01e942b200b10de29ff0d8dd772276675f90ab37db0a132909ceb3810b8c769834e0020e0e0a388cdc114b436c31eb90cf8ec75bfb4cfbf0de3e89ad5f8061b5005ed627c4adcf79476574809a690a1bf659468c7a949e100c113a4d680844a4a92f533d0cd9870837b1a041d57b77eb4902d19922b5c23d066741b973d972ab0e1bc2196973600b6c5811431091f817b914b1edabc671c6d7ec2adce66223f42c305e"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) getpeername$tipc(r0, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:21 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(r0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='user:', 0xfffffffffffffff9) r1 = add_key(&(0x7f00000000c0)='ceph\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="e05b849d9c3fd7f52777c4ea0394f3567b56c8c44429588a3067f326d077815c6e510fb28845733669c244605293dfe54d57eddbd644645fcf5dfc8d3a9a7d032be759887b8177b70d3286edb927664e88d10474dae9c0ee9eeb784f07ac", 0x5e, 0xfffffffffffffff8) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xd43439b85512eca5, r1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000040)=""/164) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:21 executing program 0: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x10, &(0x7f0000000000)={&(0x7f0000000100)=""/68, 0x44, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r0, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) 23:52:21 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) [ 315.758975][T21393] encrypted_key: insufficient parameters specified 23:52:21 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xc8000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0xe9, "1761853dc7b68f58a4bb8cfb5e65d9ba3e4168e4d8c691313fa80f8bd5d4c9c2bc3fe4aa58f2bc18924d9abb3792741df42401a93b16b773ce73d286575c69b4d6f691739bb55f6b4137648ff848169f80d72d76818743a7da15bfeb03883b4ce9f5d40a4a60478faefc68c50342c1d780a9c90f2e45ee693d931da43540e19b0502806a19ce2d57cea70fecc1099b1be50155c0463182cc9c8ccb843dc4996f26a1d52b5a63ef0118a97eea2d809a9b1767dc087ee434cdd7a65aaa8c1068df512b5f7899367139556314a8a3360c6b983959d856ef8f3e9460c81072b4993da0e7be865dfd125cc2"}, &(0x7f0000000040)=0xf1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={r1, 0x2c, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x4, @loopback, 0x4f}, @in={0x2, 0x4e23, @multicast2}]}, &(0x7f00000002c0)=0xc) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:21 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e65772064656661756c7401000000000000007a303030303030303030303030303034303936000000008805b663c4e9b5b28fcd88371e8d682db56d864538e18fcc39ea9a07eee225ef307cf653c44213b138a7ed5725d598c9d4c9e3aa9a070000000000000026a2c4348bb882ee6eff761e98b9573e1c1259e6ad594f084c8b3fded470c40d270900ae24564a7fe709ca6b9060d21e97fed5ced2"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x583200, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x20, 0x4) 23:52:21 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:21 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x103000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x7, 0x9, [0xc40, 0x2, 0x941, 0x1, 0x6, 0x2, 0x1, 0x5, 0x1ff]}, &(0x7f0000000100)=0x1a) mknod$loop(&(0x7f0000000280)='./file1\x00', 0xc000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x1}, &(0x7f00000001c0)=0x8) r3 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="96b25cd02f85dd0bb7b931d6fb7115f62733a3b398e6"], 0x8) lremovexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'btrfs.', 'proc\x00'}) 23:52:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) flistxattr(r0, &(0x7f0000000000)=""/190, 0xbe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:21 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 316.082611][T21433] encrypted_key: insufficient parameters specified 23:52:21 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:21 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:21 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x1080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064308a0230303030303030303030303030343039360052b32ad948da44b43e6d56b0314d17adc05179bd5a0f0000000000000000000000000b000000"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) socketpair(0x19, 0x6, 0x3, &(0x7f0000000080)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc0004}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r3, 0x0, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x78}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6fe6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8004}, 0x20044004) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:21 executing program 0: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40102, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040)=0x1000, 0x4) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) [ 316.125959][T21437] encrypted_key: insufficient parameters specified 23:52:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = pkey_alloc(0x0, 0x1) pkey_free(r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x80000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x109080, 0x0) ioctl$PPPIOCGIDLE(r2, 0x8008743f, &(0x7f0000000040)) 23:52:21 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200000, 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00'], 0x8) [ 316.270382][T21450] encrypted_key: insufficient parameters specified 23:52:22 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:22 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) [ 316.349238][T21464] encrypted_key: insufficient parameters specified 23:52:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 00001000000000004096\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xc5, 0xa4000) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000040)={0x2, 0x100000001, 0x3}) 23:52:22 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c744600fdc7ceaf8769059a833a2b7365723a73797a203030303030"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) times(&(0x7f0000000000)) 23:52:22 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x408000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000000)={0x80000001, 0xd052, 0x0, 0x400}) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x7ff) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:22 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xff, 0x200400) sendto$rxrpc(r0, &(0x7f0000000040)="5bb87ef49087a904efb7075c3855c30944f7969f03fd0cd401021a6ca7fcb2249974cb3724a7f0464354a6acc52b2906067b3ed5a2814b177976b0937b713fce8c74633a16ccf21a43faa1de2ad09af8c50c97c3ed5e52ecc9feb00d67e0eb939b6629f37d66f10e6d650cc74fe9616802d9ed47476b7af1d79b85b2259595cb851988ccc65452f65cc8f0dae036f16f46ff", 0x92, 0x4000000, &(0x7f00000001c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e22, 0x2, @ipv4={[], [], @multicast1}, 0x90}}, 0x24) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) setrlimit(0xf, &(0x7f0000000200)={0x7, 0xfff}) 23:52:22 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$inet_dccp_int(r2, 0x21, 0x11, &(0x7f0000000240)=0x2, 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={r3, &(0x7f0000000100)="4f4c65d0bc40c02ec51bfd6b45fb2ecb16c4c6ffc39f47ffb06df7121983b244dd137330d8a5c540ed3b55498bb4017e0e54979ba7669fb4117280e1de044569d4f02798700d433ee6a3e3db3cc021527897d284b83e66d0d78543aa44bcda240ca90f265d8c45514268eeee615d816f5a", &(0x7f00000001c0)=""/85}, 0x18) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[@ANYBLOB='=memory '], 0x8) 23:52:22 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:22 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:22 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x1, 0x3, 0x2, 0x6, 0x0, 0x12a, 0x48084, 0x9, 0x3, 0x5, 0x3, 0x1, 0x4, 0x0, 0x9fb, 0x10001, 0xc248, 0xffffffffffff7fff, 0x8000, 0x8, 0x4, 0xfffffffffffffbff, 0x5, 0x3ff, 0x8, 0xfffffffffffff800, 0xd526, 0xfffffffffffffc00, 0x10001, 0x5, 0x8, 0x0, 0x72, 0x30b0, 0xf3, 0x8, 0x0, 0x1, 0x7, @perf_config_ext={0x3, 0x1ff}, 0x28a, 0x2, 0xfff, 0x5, 0x8, 0x5, 0x5da}, r1, 0x1, r0, 0xa) 23:52:22 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:22 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x101, 0xa7f1515d79b4cc4d) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'security\x00'}, &(0x7f0000000200)=0x54) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000980)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000940)={&(0x7f0000000500)={0x434, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x14c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3, @remote, 0x20}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8001}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x5, @mcast2, 0xfffffffffffff89a}}, {0x20, 0x2, @in6={0xa, 0x1, 0x80000000, @mcast1, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x6, @rand_addr="f7f300b3c2ef18b045d87211a0b56c07", 0x9}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x81, @mcast1, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_BEARER={0x138, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @empty}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x9, @mcast2, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x6, @remote, 0xffffffff}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0xe84b, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x101, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3f, @ipv4, 0x3}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4ce}]}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x46}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb59}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6bfde014}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x434}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40086410, &(0x7f0000000280)={0x18, &(0x7f0000000240)="552abd2c2fddc436e06d6163b9dbe6dc8ccbef18c1e5aa2b"}) r2 = add_key(&(0x7f00000002c0)='blacklist\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)="cdb7bb939c98f33860943988375ecf4871d5e37f012b0a1e32b4c6cadf3c9880a6c8c772e31277c48e5c44ea21d195e6a15a1104d5aad72d9608bf0f09e16e983faef8ee4169c20c648ec3d17962517010cb41eba86139137abaf0fb23661382066c23754fc514dec95f45bff3692fd971ddbdd57f522119f5fd6744590247f5cb7d7bc0aacf3d28d1c838e17d6344f31f3112153663a2ca2aec8809a5c0df28fb88d525f795a2ba236319332c84bf850010ee00", 0xb4, 0xfffffffffffffff9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) r4 = getgid() keyctl$chown(0x4, r2, r3, r4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r5, 0x0, 0x3) ioctl$SNDRV_TIMER_IOCTL_STOP(r5, 0x54a1) write$P9_RLERRORu(r0, &(0x7f00000009c0)={0x1f, 0x7, 0x2, {{0x12, '{proc-,*em1/cgroup'}, 0x100}}, 0x1f) keyctl$instantiate(0xc, 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$KVM_ASSIGN_DEV_IRQ(r6, 0x4040ae70, &(0x7f0000000040)={0x7, 0x8d, 0x7}) 23:52:22 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000040)=""/164) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:22 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:22 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000001bc0)={0x1}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a203030303030303030303030303030303034303936004fd25453aa3978ccca98407b73b635645adb06cc1adaaa6cb2b99c01fd57d31059e3aafb35096837ff9e966e41279f32bc5604afa93f3bebc1ae6ea61f4bfa394497dd36e631510b687df0f9aedd4d50dd8254e3f86ed8711834e7bc6dca7b52f4382c0300a0b029d6e0892ef0ccb9b2229d90fa44ba67f2431d8f73b4b039cfc89cbba2d91f76d3bfe95ad8e427c9e8210cec728d3d6dae5e59d511f412d3104badd5e9c047f8256ee19fb9a3bf1def08d95d86d8b41423bac3e814541df558e254f238cc50267930367966db08eb697bc165d6ba2ebd78117d86d0d2bc66483b0e95000000a1f22fe5db7d886601a5f5106eb49f7572da823d64750d3a65cb969196a511574a6359fd46a574905f04d4dbe5bcaebe6a0434c48af65bc97c701cd14fbd41651268dca5f6598a1d71a4c83e1211686298cd4f81406e75392d5c4a828866a1ff0b8ab807ed61b808288238432d3bdf1ee68d9710f92d7673cbd66fac8d049f493185239feb43f837e3da16958bd1d5"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x16a, 0xfffffffffffffffe) fcntl$getownex(r1, 0x10, &(0x7f0000001480)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001cc0)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000001dc0)=0xe8) getresuid(&(0x7f0000001e00), &(0x7f0000001e40)=0x0, &(0x7f0000001e80)) lstat(&(0x7f0000001ec0)='./file0/file0\x00', &(0x7f0000001f00)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001f80)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000002080)=0xe8) r10 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000020c0)={0x0, 0x0}, &(0x7f0000002100)=0xc) getresgid(&(0x7f0000002140), &(0x7f0000002180), &(0x7f00000021c0)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002200)={0x0, 0x0, 0x0}, &(0x7f0000002240)=0xc) lsetxattr$system_posix_acl(&(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='system.posix_acl_access\x00', &(0x7f0000002280)={{}, {0x1, 0x2}, [{0x2, 0x0, r5}, {0x2, 0x0, r6}, {0x2, 0x5, r7}, {0x2, 0x6, r8}, {0x2, 0x1, r9}, {0x2, 0x7, r10}, {0x2, 0x0, r11}], {0x4, 0x2}, [{0x8, 0x4, r12}, {0x8, 0x7, r13}], {0x10, 0x1}, {0x20, 0x7}}, 0x6c, 0x3) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000014c0)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f00000015c0)=0xe8) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000100)) add_key$user(&(0x7f0000001a40)='user\x00', &(0x7f0000001a80)={'syz', 0x1}, &(0x7f0000001ac0)="c5eab859e4b46eaaa75503b46af4cf362e3e252c36dba76943e7a61aebcf90ee6196b7407e5dc3c15e87c4cea3fb79daea6bd45792d5e55c4a327e48c4a680ae76848b3351e261f561c3cb03b54977ce4745736f8b5f67d19edc942282ea7c66648f0edf76c0bf9f9d9b2553e1daad858cc5ea2a4f3d6cb082ba523cc81f179051abeff056a76e1ea49abdd32d7ed725d4cdcf7d92126de431b7c3288c3355b9f295a56dc9520f0797fdd6052877efacb912b61e2c63cc9954dcb94c398357839f2ddc2cbf5de6921f3308f9f890f94ac9952e74ca9fe6c89037ffd55399bc233e81b1395f830cd3eb90807f32b670699f503cdf32e3", 0xf6, r3) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0, 0x0}, &(0x7f0000001640)=0xc) sendmmsg$unix(r0, &(0x7f00000016c0)=[{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001440)=[{&(0x7f0000000080)="fb6eecd0be1ce5d43d6b1f75380861d56f626aeaaf", 0x15}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000000c0)='Q', 0x1}, {&(0x7f00000001c0)="0634cf4d38648ba521bc83661d532c6a942c7af765e00ecbc6d45d1db229d4fe42850b668d13fe0eda69cfd5e038ccf487f40e7564cc03ea7f685e2e3bf2d15ea9f7c48e87ed61a446a335a81c34331eac802eb9c6f11c480958605e27fb6de0b99447f01d5c47acbb7e7696fc58ec6dddfa17ceea6ea07664d92d22349f51b776e896f425947f9c1b8801602aa18a6b", 0x90}, {&(0x7f00000012c0)="0fe0f2f824de069eb9", 0x9}, {&(0x7f0000001300)="68f5fe4df17c9be127af32504a0631a017a22843e25f82399f0790fee42a6ebd0fa7d7888114ecbacbc3a8b4b26feaceec3ab27cafd3012879ea48727a2bd2491789d2a5e029a258a8ca4d8e6bf5df487e359a07836f57b9c3221e62c10e31e33a1d7db65e2dbe28fed40b35edde830de0570817f407c5b460cad0737969817e13f6ecf014bc81368a78d4", 0x8b}, {&(0x7f00000013c0)="a017c40db695e5e40c84d01e4c41cdc06e7bd6d6cc48cc01235d3d724c2e4a50c7198a1b3330d7df49c1c578fb2a9a4bc11c746b90d34f5aff82cbaa405df836bca3a0b18e86df0591c2af3b4ed8164456b8b09716", 0x55}], 0x7, &(0x7f0000001680)=[@cred={{0x18, 0x1, 0x2, {r4, r14, r15}}}, @rights={{0x20, 0x1, 0x1, [r0, r2, r2, r2, r0]}}], 0x38, 0x20000000}], 0x1, 0x8044) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000001700)={0x0, 0xd5, "a487b5e1f83a172ed35bf6dc5e5cca029429388815428c0f68a5303a10661c2d8482efc26d18adb5e949dbd8dc6028b2191cce4404c6a22febb62be7569db31c7160fa81a2f51a2a327ac145b11433baf361d5b9fd45cba647bf4b4e80f2c05820bfeb81683b6befe281fb6147ed772bb1a0e588383068ca48a0075e0f210abbe625bcf513f203a09d190b23b84e114b40a4a68b1a1071eb0ca6c6a44ab9852f79a511e0fd3760f6e6741f58fe017b9c488a377eb491570fbf1aaa8d2c71b46b67d2034f60751d14d8a11af123ad2b70d4b3375364"}, &(0x7f0000001800)=0xdd) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000001840)={r16, 0x2, 0x8, [0x4, 0xffffffffffffff80, 0x1f, 0xffffffffffffffff, 0x2, 0x6, 0x101, 0x2]}, 0x18) openat$udambuf(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/udmabuf\x00', 0x2) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffdb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x7, 0xc661, 0x3, 0x81b, 0x5, 0x100, 0x5, 0xfff, r1}, 0x20) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:22 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:22 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:22 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x5, 0xfffffffffffffdc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xe0000000, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000001c0)="853cdee345aa699799b2e9fec04b0657d2cdbf0eb21270423b4cd8a9cbb1c093acdb5ace5c27a3af76a76ad4b063613e2bd67f8efcc111ce9e87bd28dfd2d15639ff8b6eae2fce00ffdba468ef2729004b716eeffb072446f77dc6a02ee025d722ed65469c56a0e1b0b6c1b5", 0xffffffffffffff83, 0xfffffffffffffffe) 23:52:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x501000, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.clone_children\x00', 0x2, 0x0) add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 23:52:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000040)=""/164) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 317.034550][T21539] encrypted_key: insufficient parameters specified 23:52:22 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:22 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) [ 317.155866][T21539] encrypted_key: insufficient parameters specified 23:52:22 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) seccomp(0x0, 0x1, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x5, 0x8, 0x80000000}]}) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:22 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:22 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:22 executing program 3: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='.GPLnodev\x00', 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="4d441270564e2ed1cbc3ecaf20b9c93c8819d277b0045569b95b46315c20863bba06816b7ab17d", 0x27, 0xfffffffffffffffb) r0 = request_key(&(0x7f0000000240)='blacklist\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)=':]\x00', 0xfffffffffffffffd) keyctl$instantiate(0xc, r0, &(0x7f0000000300)=@encrypted_load={'load ', 'default', 0x20, 'user:', '', 0x20, 0x3f, 0x20, [0x3d, 0x3b]}, 0xfffffd5e, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$reject(0x13, r1, 0xfb6, 0x7ff, r1) 23:52:23 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x0, r1}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x501000, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.clone_children\x00', 0x2, 0x0) add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) [ 317.378334][T21574] encrypted_key: insufficient parameters specified [ 317.403825][T21569] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:23 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 317.427061][T21582] encrypted_key: insufficient parameters specified 23:52:23 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) connect(r0, &(0x7f0000000040)=@isdn={0x22, 0x7, 0x80000000, 0xffffffff, 0x593e359f}, 0x80) pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:23 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:23 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757362fa2fd2ff14680c3030303030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000000)={0x0, r2, 0x7f}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)={r3, r4}) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new defaul| user:syz 00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e2069faba3b0e8d937bdc2efc0ab8da54ac00002075730000000000004f5c3030"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:23 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 317.629935][T21596] encrypted_key: master key parameter 'iúş;Ť“{Ü.ü [ 317.629935][T21596] ¸ÚT¬' is invalid 23:52:23 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={@empty, 0x72, r2}) getitimer(0x3, &(0x7f0000000080)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/40, 0x28) [ 317.683955][T21604] encrypted_key: master key parameter 'defaul|' is invalid [ 317.698192][T21607] encrypted_key: master key parameter 'iúş;Ť“{Ü.ü [ 317.698192][T21607] ¸ÚT¬' is invalid [ 317.721566][T21609] encrypted_key: master key parameter 'defaul|' is invalid 23:52:23 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 317.754235][T21599] encrypted_key: master key parameter 'usbú/Ň˙h 0000000000000004096' is invalid 23:52:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz \x00\x00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0xd) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000002c0)="fe2d75f200d40792df29a6aef835f44186f77ac0a94c6d9762fb3e0d2f94e6226ae3c5c4898a8a24a6e0cb1f6dba1c2571f15dd8638997f69d738edf6430d76061de7749911c466776f505ec3c92cbd90ca252d139efe5d51949aeff15ece4edf1cad07b06e39c72970e8a9b7dea694ab4be90fc998dcff99a9d57756095058c5252d9b48f62da52de8475ccff7585fdc6c1e64df057bbfeb2d5eb9d16bc50878ef891b8f0995ec9f7a6dfb1fad866b0c7f4a05d5e8f7893d33517d3713844ab00000000000000", 0xfffffd3e, 0xfffffffffffffffe) 23:52:23 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) modify_ldt$read(0x0, &(0x7f00000001c0)=""/41, 0x29) keyctl$instantiate(0xc, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a203030303030303030303030303030303034303936001a485a45347ae24d1994446e2bed86fe4218240c58b99fbee3063ad58985eb105f6e9aded28859"], 0xfffffffffffffc48, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xaee2874ebae2d6df, &(0x7f0000000040)="6ac11820daf8e8cc6f7af5fb7cbe3ceb0aa89d6d77bf653031da4f7713184e7b0b6f1be65ae09786b1756a76a140f565438d4b5601994ff34f96443dea17a89f365169923041a38b5539623066351e919982c27b2b79a72c2200f9c7dddd60c0cac929a4f7bc63c075375ef218fe4359d2c1791e77e9eef61948fc7d5f181d698a8bcbdd2d991dfa8a1b7b56f25e60a86e6dba5b8139b1f4fac42dd14716bad145ba9ba9aab1f763ae76e207d8a8b5c69b4f2e9dc9ea1d45379acf401d", 0xbd) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:23 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x81, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 23:52:23 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x19) 23:52:23 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) [ 318.056824][T21629] encrypted_key: insufficient parameters specified 23:52:23 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6577200000000000000002757365723a73797a20303030303030303030303030303030303430393600abd56fd7510d2215020b7df25504b7fdee67b7ed45cd9c53c1f260ccd4ee1d4e90517e34aea2a4e036e10583e8a61c001a7fd63c7747f9e54d6b029e599f8ea9fca64442fbbc7a8d0955eec0834f556fe96a707c871b2fd6553627d150ca1467c048a462706fcfb517082bf51444deef9777"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:23 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000002c0)={@empty, 0x72, r2}) getitimer(0x3, &(0x7f0000000080)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/40, 0x28) 23:52:23 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:23 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb62}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48001}, 0x2000c000) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r3, &(0x7f0000000300)=@encrypted_load={'load ', 'default', 0x20, 'trusted:', 'syz', 0x20, 0x5, 0x20, [0x77, 0x75]}, 0x31, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r1, &(0x7f0000000200)={0x2, 0x4e23, @multicast1}, 0x10) [ 318.235419][T21657] encrypted_key: insufficient parameters specified 23:52:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x82) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000040)={0x7f, 0x0, {0xffffffffffffffff, 0x3, 0x3, 0x3, 0x80000000}}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:23 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$search(0xa, r1, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x2}, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 318.304933][T21661] encrypted_key: insufficient parameters specified 23:52:24 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:24 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000000c0)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='vmnet1\\--\x00', 0xfffffffffffffff9) r0 = add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)="3582cc7c5e6ed6f896c8abd2ae4e5361dd4dee751960e0ea466dac17a108090c26d51c616fb0dcb6a12ec86cd89d79909be7831114891aa43309c713f301ee122e1e85627e4fa04eabcccefffb3c10abe0b49c2c9f2a738d6897f46942751e8b0279b355f92377e0d8873284298a01b466632282ded6397a6ccf85c495ce5c33adb8684ad31c8d6406800536e82111dbe32854a7f2d165df1aea7db2e282009de700f2e854c0053e2e961173578c9d1ca5ecaab0b4136f30d8a0cf14bfb56cbfd9097f6d337462df84bd1e601612073fc22eec01074876886639571bf2d82549c79907a844637658b59279fbd65ef79c", 0xf0, 0xfffffffffffffffb) keyctl$instantiate(0xc, r0, &(0x7f0000000500)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r1 = add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="11b8d1b1a5a0cc848990d1fe88607b4616a1c783f271e7ac15331456", 0x1c, 0xfffffffffffffffe) add_key(&(0x7f0000000300)='enP&\xfds9\xc7cr', &(0x7f00000002c0)={'syz'}, &(0x7f00000001c0)="52af7a94e3e446803066291c0308cb103fb20e26245df9dbf138c2555f5e57e44ea34a0df6129db5b9d53afdd9be671acd8955d45a3ca51ff1297fea60693520ac333cecd9ad595bcf503f5241c117ea4ed2c2cb3b819f712270c04bd49bf55b80ab32d91466ce3cabe15518a256cc7740694d95d1b977c947fe4da8f3f26ecf904c68812d9cc3064bf3e4cc0cceca10b019ed95da549e8c67287082dd29ecda88f989ce77cd75e534ebd2b5ee6b7c91a702371c2d9eac5e42ed64974ed9d365e66e810f6f317f0d350767d0c792caca1603f5f0c76d", 0x320, r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x400040, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2, 0x30}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000580)={r3, @in={{0x2, 0x4e23, @loopback}}, 0x1, 0x1f, 0x2, 0xffff, 0x1}, &(0x7f0000000640)=0x98) 23:52:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 318.454452][T21668] encrypted_key: insufficient parameters specified 23:52:24 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$search(0xa, r1, &(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x2}, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 318.505364][T21677] encrypted_key: insufficient parameters specified 23:52:24 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e6532b01f67ca0ad748742075301b000030387fbdf0a9b91c79fbd1821907b5b35703000000659cb71c30de72a732de1325a084c78f29c22abe2778941cc7c412e442811c7f9938d8ce697034f140e7e8e7dea13812b0f1176a05d3e504695ca3280aa1619c1d3253f3939823d02fe83cbe3d5431504bbbcd2e482fe65addaf994886e10088ba90b4275cc59a4708d5f3b40cb4581135169d437a8baf14e65fc31fab45ca4828d76bec8f8f05"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000100)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000200)={@empty, r2}, 0x14) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:24 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7f, 0x40) openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:24 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:24 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000080)={0xa4, 0x8, 0x7}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x400, 0xfffffffffffffdec) 23:52:24 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:24 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:24 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a203030302b3030303030303030303030303430393600c8aae40934db6c94151b3459efdfa6adbe2010013449d4c1bf3f6e854419a35cf3a4de89c3b25a786177f22da97fb19b871bdca35fd2ea40fc90fe691798e12f738602a577ea4ce63cbe7ac0af5e5620ab822c015ec2b6e0e1684cc95b6427c059ec34155757cf6afe952bb0755d3840cd313649c9468be7c7ed46880f8257121e199787ce625b5a25283921ec4c381d598dac788c93eac4b23f69d9327eef63b502e61bf38d3e3e7cfdf66a93b074a9a2cff4f5126d433deae09f92db7d791eeaaa40860641bc0b81947cc888567ce14b33c590ca0654e939a5602b3d7a0f541137e9644ae81e5f4b1c0cbf606d7837d9ff0e3493bc0104f74f207ffbabe8f4d6"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/2260], 0x8d4) add_key(&(0x7f0000000140)='rxrpc_s\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) timer_create(0x3, &(0x7f0000000000)={0x0, 0x30, 0x1}, &(0x7f0000000040)=0x0) timer_gettime(r0, &(0x7f0000000080)) r1 = accept4$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f00000000c0)=0x6e, 0x80000) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000240)=@generic={0x0, 0x0, 0xbb}) 23:52:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000400)="f8c53c18856dca759d042a0adacd9cbdd82ca9954f57f53c000dea647f1ce9a2f23ae5eb0a70deb17b4eea7b9d3d5310cdb598ae473a43592147508d5832765e569adec894b4ebc3b98ea9f8561592e1970061232d9f142945dc4ee2fdf67c62e653ee812c62cce5664c9d82f7b99e0dbcc8d6580f39ae4d0f79c06f36495edbf0f2ec92262c8e3ef21ea7225f17b6eb3b5efff5ab2e701a99d482da4dade3a214888b41ed5fdbb6a87f28c99ac1c1912510e15f7a919991504d9b8ec722f996e37e49dbb01086cb936e17a5d15e649e565a48bf5d646576ae58964e8dbcc370aa84a91cf2680e97d76eb989eb43", 0xee, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$link(0x8, r0, r1) keyctl$instantiate(0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xfffffffffffffc48, 0x0) syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x1, 0x2) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:24 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new def00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40040, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/74, &(0x7f00000000c0)=0x4a) 23:52:24 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) [ 318.930383][T21730] encrypted_key: master key parameter 'def00000000000000004096' is invalid 23:52:24 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x100000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:24 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:24 executing program 1: munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000002c0)=""/4096, 0x1000, 0x10140, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, {0xa, 0x4e23, 0x9, @loopback, 0x479}, 0x1, [0x1, 0x0, 0x5, 0x8, 0x9, 0x7, 0xffffffff, 0x101]}, 0x5c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303030303030303030303030cfefa7cf381bed02008749bc71770711e24cb665168494d23c32cc215370a1784935c17e9ffe5269d85393c1dcd450327c4901ced04eb885f1a3efd2cae43fa165cb5e630a92b559223209f39c22ded13b"], 0xfffffffffffffc48, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000240)={'vlan0\x00', {0x2, 0x4e24, @remote}}) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000100)) add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 318.976757][T21728] encrypted_key: insufficient parameters specified [ 319.011712][T21736] encrypted_key: master key parameter 'def00000000000000004096' is invalid 23:52:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40000, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x2c, r1, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2cd}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000040) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06055c8, &(0x7f0000000240)={0x10, 0x3, {0x51, 0x0, 0x6, {0x0, 0x9}, {0x3, 0x3}, @cond=[{0x96, 0x1000, 0x9, 0xc2d, 0x8001, 0x80}, {0x149, 0x8, 0x6, 0x1f, 0x9, 0xec}]}, {0x54, 0x9, 0x7fff, {0x86, 0x7}, {0xfff, 0xc94}, @cond=[{0x53f, 0x100, 0xf4, 0x57, 0x40, 0x8}, {0x401, 0x3c9e2707, 0x1ff, 0x3, 0x4, 0x9}]}}) 23:52:24 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) [ 319.038930][T21738] encrypted_key: insufficient parameters specified 23:52:24 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:24 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000080)) rt_sigtimedwait(&(0x7f00000000c0)={0xfffffffffffffff9}, &(0x7f00000001c0), &(0x7f0000000100)={0x77359400}, 0x8) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x24900) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000040)) 23:52:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new def00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40040, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/74, &(0x7f00000000c0)=0x4a) 23:52:24 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 319.218397][T21756] encrypted_key: keyword 'new' not allowed when called from .update method [ 319.243834][T21765] encrypted_key: master key parameter 'def00000000000000004096' is invalid 23:52:24 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:24 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new def00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40040, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x1) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/74, &(0x7f00000000c0)=0x4a) 23:52:24 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 319.277925][T21766] encrypted_key: insufficient parameters specified 23:52:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x400400) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)={0x9, {0x80000000, 0x2, 0x5, 0x5}}) 23:52:25 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:25 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 319.364591][T21775] encrypted_key: master key parameter 'def00000000000000004096' is invalid 23:52:25 executing program 0: munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) recvfrom$inet(r0, &(0x7f00000002c0)=""/4096, 0x1000, 0x10140, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, {0xa, 0x4e23, 0x9, @loopback, 0x479}, 0x1, [0x1, 0x0, 0x5, 0x8, 0x9, 0x7, 0xffffffff, 0x101]}, 0x5c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303030303030303030303030cfefa7cf381bed02008749bc71770711e24cb665168494d23c32cc215370a1784935c17e9ffe5269d85393c1dcd450327c4901ced04eb885f1a3efd2cae43fa165cb5e630a92b559223209f39c22ded13b"], 0xfffffffffffffc48, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000240)={'vlan0\x00', {0x2, 0x4e24, @remote}}) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000100)) add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0xffffffffffff1469, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$9p(r0, &(0x7f0000000200)="43e91b69cff14a9540a164b4cf1a13cc0c72435b986f7d57c732482252e6e6d2c68233ef5669b953737bcead82bca58a2178827c21430ab01088550bc6b1eb210eb0eabf97c349faee9a2b0d929991ef6d7ef24546188129dfb19e78c57d98000f91f3ca19be3d3edc0d59106b3417dcaa8461086e2b6ffd73bf39a82eebfb5ac275ffc3fe0380a75db63ad1f997d964fd2d80a6fd1e994220af212deb0fa981c77177a9c37ad768cb3cd8ce014c99ad7020b1b12ec0bb2a0c43c169e3496d6cca8f6b9c4d37", 0xc6) keyctl$instantiate(0xc, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a203030303600e35866fe251562ce8e9144088916c1f0e92fdf8ae7dfa5329f91effadf6dcd1cdc23a59af1"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x74d) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x800000004003f, 0x2004) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000180), &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100)={0xfffffffffffff427, 0x4, 0x7, 0x12b, 0x4, 0x9, 0x8, 0x1ef64431, 0x7fff, 0x5, 0x8}, 0xb) 23:52:25 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:25 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x420c0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a45323, &(0x7f0000000440)={{0x2, 0xf91}, 'port0\x00', 0x81, 0x100000, 0x1, 0x4c9a, 0x1, 0x5c89c8d4, 0x3, 0x0, 0x2, 0x400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000500)="f43e5c91b5a89984129b4b70a43c587318f92d2434af6e40eb051224363df8a0e2", 0x21, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='cifs.idmap\x00', 0x0, &(0x7f0000000240)="dfe6fd67da1fe83930be6c23ae026428f1f8dd6a72720425ccf4d6cb631add652ef3b51527b8285efd5a471807941d3ca4c9c7027948982ac047bc94f67adf8a8c0ccc9542cb0e474386b8494986fe8ab8c7f46d846eed6757cd1a8e6a2f3eac0e693bb2639376d1e21a53f1", 0x6c, r1) r2 = request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='default', 0xfffffffffffffffc) prctl$PR_SET_TSC(0x1a, 0x3) r3 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720656372797074667320747275737465643a2f764181c578e842f631383434363734343037f097786100"/60], 0xfffffffffffffefc, r3) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000540)) getsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000080)={@empty, @broadcast, @remote}, &(0x7f00000000c0)=0xc) 23:52:25 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2001, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000040)={0x9004, 0x0, 0x1, 0xffffffffffffffff, 0x2, @stepwise={{0x7, 0xdb}, {0x8, 0x8}, {0x5183446a, 0xffffffff}}}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:25 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e65772064656661756cb620757365723a73797a20303030303030303030303030303030303430393600a5ff11de77fb8600e5b17dbdda8b7d1ca808acbe3666b1666852fdd874b505000000a745ba9b9fc1af1daf82283b5f4ce7f760c1cc49953a8b7ed2"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) setsockopt$inet6_dccp_int(r1, 0x21, 0x15, &(0x7f0000000000)=0x8, 0x4) connect$inet(r0, 0x0, 0xfffffffffffffdd5) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x7fffffff, 0x8}) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xfffffffffffffffc) 23:52:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) set_tid_address(&(0x7f0000000000)) 23:52:25 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) [ 319.992984][T21808] encrypted_key: insufficient parameters specified 23:52:25 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000080)) rt_sigtimedwait(&(0x7f00000000c0)={0xfffffffffffffff9}, &(0x7f00000001c0), &(0x7f0000000100)={0x77359400}, 0x8) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x24900) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f0000000040)) 23:52:25 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:25 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) [ 320.055663][T21813] encrypted_key: insufficient parameters specified [ 320.095706][T21823] encrypted_key: keylen parameter is missing 23:52:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 23:52:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e20, @local}, {0x306, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'teql0\x00'}) [ 320.135974][T21825] encrypted_key: insufficient parameters specified [ 320.165099][T21827] encrypted_key: keylen parameter is missing 23:52:25 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:25 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:25 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r2 = dup3(r0, r0, 0x80000) ioctl$TIOCGISO7816(r2, 0x80285442, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x8d0}, 0xf) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xac, r3, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x28d3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x4}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0xac}}, 0x44) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$isdn(0x22, 0x3, 0x22) pidfd_send_signal(r0, 0x15, &(0x7f0000000300)={0x3d, 0x8}, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) [ 320.238283][T21840] encrypted_key: insufficient parameters specified 23:52:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000080)=ANY=[@ANYRESDEC, @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESHEX=r0, @ANYRES32, @ANYRES64=r0], @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYBLOB="f771888f390971ad0285d8c1c73c0f9658474fa5e6f44b1656955326744dac3ce5a65ed91aeb0251a1a9ccbdb463aaac3a5fb9e1593426d4e9505607a1531a0019c0fc2629dee07708aa8ca1da54e9780500e40aad3f22783078b0a231cb108076ff0f4953e03e815b18e298435b445c4130d90cc4a53c4a96f669f35ef2f6fa2a61ab3f3e80f12fc3d693016f47a64dbcac6c8278bc25bf94c61cd91d01274237e8061f80237481c65e34b2ddaca246bf8c071415117488b52c17c4e421a23030bbd40f242733096dca394b4ae077219fb207d95fe8ee476c79fed98e", @ANYRESDEC=r0, @ANYPTR, @ANYPTR64], @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYPTR64, @ANYPTR, @ANYRES32=0x0, @ANYPTR64], @ANYRES32=r0, @ANYBLOB="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"], @ANYRES32=r0], 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000100)={0xc, 0x7, 0xfa00, {&(0x7f0000000400)}}, 0xb) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$RTC_EPOCH_READ(r1, 0x8004700d, &(0x7f0000000580)) 23:52:25 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:26 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000000)='e\xb9\x884pp\xe6\x9dd\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) openat$cgroup(r0, &(0x7f0000001500)='syz1\x00', 0x200002, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)={0x6, 0x0, [{0x4000, 0x7b, &(0x7f00000000c0)=""/123}, {0x1000, 0xfa, &(0x7f0000000140)=""/250}, {0x13000, 0xce, &(0x7f0000000240)=""/206}, {0x10000, 0x15, &(0x7f0000000340)=""/21}, {0x2000, 0x58, &(0x7f0000000380)=""/88}, {0x10000, 0x1000, &(0x7f0000000400)=""/4096}]}) [ 320.431737][T21858] encrypted_key: insufficient parameters specified [ 320.493098][T21867] encrypted_key: insufficient parameters specified 23:52:26 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r2 = dup3(r0, r0, 0x80000) ioctl$TIOCGISO7816(r2, 0x80285442, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x8d0}, 0xf) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0xac, r3, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x28d3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x80}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x4}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0xac}}, 0x44) connect$inet(0xffffffffffffffff, 0x0, 0x0) socket$isdn(0x22, 0x3, 0x22) pidfd_send_signal(r0, 0x15, &(0x7f0000000300)={0x3d, 0x8}, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) 23:52:26 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f00000002c0)={0x3, 0x0, 0x2080, {0x1, 0x1f000, 0x3}, [], "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", "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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a2030303030303030303030303030303030343039360036d075fa692c4e59f255b1c7962f80e80a5eb0866a79004a609ddc6a0b3db53403654b48d7cd71"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000002440)='cifs.idmap\x00', &(0x7f0000002480)={'syz', 0x2}, &(0x7f00000024c0)='encrypted\x00', 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000002340)="a204b3279491dd134a7dbb424197589b8edab5ad37bd9900a1a3370fd6c3744733770238a985eeb8eb86a760507e409da06320d1e90a242629b570a941377fa13b2abbdf6b4826d2e243f49897fb2aa5c0e19dc72db6f40ea4cbff8233f5efd9fdc546b18e551df4fec6e8a7988f1fa083651669081c72f628b9fe208e2af6d8830450fc1674b9e7e9df1e6a6c9c6a60cac32b6049279c5f576683c0bd9064dbab2ae879189134330bd4fde1309304c43e874c8f9a7aa1fb0f57fe663a78f7f706b4a906363b095f8137cf01db1a41cc4b2a19a7c3e0dd6a372a9479224cffacf77bb5d94362", 0xe6, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:26 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB=':syz 00000000000000004096\x00'/42], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:26 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:26 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:26 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) [ 320.994317][T21883] encrypted_key: insufficient parameters specified [ 321.001537][T21878] encrypted_key: master key parameter '00000000000000004096' is invalid [ 321.013797][T21884] encrypted_key: insufficient parameters specified [ 321.022886][T21885] encrypted_key: master key parameter '00000000000000004096' is invalid 23:52:26 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x800, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000040)=0x5a35) r1 = msgget$private(0x0, 0x2) msgctl$IPC_STAT(r1, 0x2, &(0x7f00000001c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000011c0)={0x7fff, 0x3, 'client0\x00', 0x7, "c8d20cfe06e52c2b", "6cba25c31bcbabaa26a1932b4a6d3a86b5df0383e2c5ce176715a06d0d86716b", 0x2, 0x7f}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:26 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new defAult user:syz 00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a203030faafc537303030303030303030682229d914ae56e623303430393600"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000200), 0x0, 0xfffffffffffffffe) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xd3a3}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={r1, 0x6}, 0x8) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) 23:52:26 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e20, @local}, {0x306, @local}, 0x0, {0x2, 0x4e20, @multicast1}, 'teql0\x00'}) 23:52:26 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)="6e704d007a98cb0a49bfa41aa4dbaa9ced49b1a9d231e997cda964de7d7c89dfae0f62dfbf2941616c53a68de6b7d43b4233866416283b4e4650d01ca52847b8ab22126500278c0b9df96bb3fc3e71f8e0b9baa6b96b47620be670b853987c25b393ca27e26d379dad6b48dbfcdf463cd6582630e4d44d516f2c6aecf6cd69bb918e09b64db9e21888eafa24a3aafcedac2d50c3a94e50dde4fc99f3c8eaeab01906", 0xa2, 0xfffffffffffffffe) 23:52:26 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:26 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) [ 321.266828][T21906] encrypted_key: master key parameter 'defAult' is invalid 23:52:27 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80000001, 0x40900) ioctl$KVM_SMI(r0, 0xaeb7) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 321.361185][T21920] encrypted_key: master key parameter 'defAult' is invalid 23:52:27 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x420c0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a45323, &(0x7f0000000440)={{0x2, 0xf91}, 'port0\x00', 0x81, 0x100000, 0x1, 0x4c9a, 0x1, 0x5c89c8d4, 0x3, 0x0, 0x2, 0x400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000500)="f43e5c91b5a89984129b4b70a43c587318f92d2434af6e40eb051224363df8a0e2", 0x21, 0xfffffffffffffffb) add_key(&(0x7f0000000200)='cifs.idmap\x00', 0x0, &(0x7f0000000240)="dfe6fd67da1fe83930be6c23ae026428f1f8dd6a72720425ccf4d6cb631add652ef3b51527b8285efd5a471807941d3ca4c9c7027948982ac047bc94f67adf8a8c0ccc9542cb0e474386b8494986fe8ab8c7f46d846eed6757cd1a8e6a2f3eac0e693bb2639376d1e21a53f1", 0x6c, r1) r2 = request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='default', 0xfffffffffffffffc) prctl$PR_SET_TSC(0x1a, 0x3) r3 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r2, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657720656372797074667320747275737465643a2f764181c578e842f631383434363734343037f097786100"/60], 0xfffffffffffffefc, r3) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000540)) getsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000080)={@empty, @broadcast, @remote}, &(0x7f00000000c0)=0xc) 23:52:27 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a2030303030303030303030303030253f2c44b9d056c9a216dab92c148bd4e224cff3b33901b0020e70"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0xfffffffffffff411, 0xb7d}) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:27 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 321.448046][T21929] encrypted_key: insufficient parameters specified 23:52:27 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 321.499680][T21932] encrypted_key: keylen parameter is missing [ 321.505780][T21934] encrypted_key: insufficient parameters specified 23:52:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2001, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000040)={0x9004, 0x0, 0x1, 0xffffffffffffffff, 0x2, @stepwise={{0x7, 0xdb}, {0x8, 0x8}, {0x5183446a, 0xffffffff}}}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 321.569056][T21940] encrypted_key: insufficient parameters specified 23:52:27 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:27 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80800) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x8, 0x20, 0x1000, 0x5}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000200)={r1, 0x1, 0x8, 0x1, 0x9, 0x4}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7429757365723affff7a203030303030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) 23:52:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 0000000000000p004O96\x00'], 0xfffffffffffffc48, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x220000, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000000c0)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000040)={'bcsf0\x00', 0x3}) [ 321.611869][T21947] encrypted_key: insufficient parameters specified 23:52:27 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:27 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) r2 = request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='$wlan0wlan1!system\x00', 0xfffffffffffffffe) add_key(&(0x7f00000000c0)='.dead\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f00000002c0)="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", 0xfffffffffffffffc, r2) connect$inet(r1, 0x0, 0xfd70) 23:52:27 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:27 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='clear_refs\x00') r3 = gettid() r4 = syz_open_procfs(r3, &(0x7f0000000080)='comm\x00') exit(0x0) sendfile(r2, r4, 0x0, 0x1) keyctl$instantiate(0xc, r1, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, r0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 321.776064][T21963] encrypted_key: master key parameter 'default)user:˙˙z' is invalid [ 321.817971][T21963] encrypted_key: master key parameter 'default)user:˙˙z' is invalid 23:52:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000005c0)=ANY=[@ANYRESOCT=r0], 0x1, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x2, 0x8000) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000280)={0x2, "a347d2aeec9c4aa31cdf8343f4fb881470dbb3bb628f4975909491e830849f51", 0x7, 0x8, 0x1, 0x200, 0x2, 0x7, 0x7ff, 0x1}) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1ff, 0x2000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f00000001c0)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x5, 0x4, 0x4}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/131, 0x83}, {&(0x7f00000006c0)=""/2, 0x2}, {&(0x7f0000000440)=""/59, 0x3b}, {&(0x7f0000000480)=""/120, 0x78}], 0x4, &(0x7f0000000680)=""/50, 0x32}, 0x40000000) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000200)=0x0) fcntl$setown(r0, 0x8, r3) 23:52:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xcecb, 0x80000) ioctl$KVM_XEN_HVM_CONFIG(r0, 0x4038ae7a, &(0x7f0000000240)={0x9, 0xbff, &(0x7f0000000040)="076a3908d09f505828a8ebe4be7794bcab410661609a13075951c5a84d3337807b6a099abdcd7aa5ef57a2bd9f8586da090fd52d34d57dbeb1263a29bd784e1a5a4217facda5d4e7eb44df304b74227178b8e41aa88d2c3f17a019430866e0b6a6832bb3b29e4120eb02bcd80fd13a96a51b59f9f3b63786d8309a99c1e60e5dbe09110bcafe175484b96104f010c102a4bd", &(0x7f00000001c0)="5ad4d1da190d673ad6c1f39cbbd744a6b49ae7fcb2da9e15b7d947475a96aa65e89c5b9d6601f05c6320b9ae0aa9ede65aa4018e2ee03c77ff60a9dea187783bdd4f1a1d243f2e716a6fd1fb97369983a70c28704f58be75e8539708e01edbaf3c9be27a978d9bbdae6b3727176597c5a528b31c83bbcdb59941b47d83ee", 0x92, 0x7e}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}, {0x2, 0x4e22, @multicast2}, 0x20, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000280)='syzkaller1\x00', 0x3, 0x7f}) 23:52:27 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:27 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:27 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3000009, 0x50, r1, 0x8000000) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 321.989202][T21984] encrypted_key: insufficient parameters specified 23:52:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6d772064656661756c7420757365723a73797a2030134dbfbb4046a68d00000000000000001cf10000e6a32cd172752ca74e5f4a38e680dc61edd43343797695a02c4b34162f42f09f4b68c3b1234efabe7a7d9332c61373383dec5ac413320ae5d3af9fc90b9aedf40477cc2781000000000000000000"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000380)={'raw\x00'}, &(0x7f0000000400)=0x54) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_DO_IT(r2, 0xab03) pipe(&(0x7f0000000340)) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x134, r3, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6e58e0bb}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff00000000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xc000000000000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0xac, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @remote}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6, @mcast2, 0x8001}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xe7e}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3, @loopback, 0x4}}}}]}]}, 0x134}, 0x1, 0x0, 0x0, 0xc8c0}, 0x40811) 23:52:27 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 322.058086][T21992] encrypted_key: insufficient parameters specified 23:52:27 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656611b3063420e018a549757365723a303030303030303030303030303400000000000000"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:27 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) [ 322.112603][T21997] encrypted_key: insufficient parameters specified [ 322.132041][T22002] encrypted_key: insufficient parameters specified [ 322.148700][T21997] encrypted_key: insufficient parameters specified 23:52:27 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f00000001c0)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000000)=""/193) [ 322.190646][T22006] encrypted_key: insufficient parameters specified [ 322.230427][T22012] encrypted_key: master key parameter 'defł4' is invalid [ 322.284892][T22017] encrypted_key: master key parameter 'defł4' is invalid 23:52:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) mq_timedsend(r0, &(0x7f0000000040)="78bf92db4c9ea6e0de23a4ada8a623ef238c7c46e87b61c04ecaa4ef825c8ff325d116e5592e088aa60c4f08d767e3de4b51369f4bdb2d7b12de99ed5eaac6bc3a7cb474f68148edfdcdccb783684950889dd4c42bd8d12e85637f3737e502fefe2c5bc31ac01918bb64588538bc1520c4bca9d68e75696e", 0x78, 0x9, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = request_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='-\x00', 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000240)={r1, 0x65, 0x1e}, 0x0, &(0x7f0000000280)="b283c6015270b85fe1d6f8a986431be9201866533f1ceae044e6538f93bf327c8c5246050945a7d6475762c80ad4bf6af126b768fdc966275e025287e5be71e0139f3956cdfa636a14be24ccb6fc4064285db448397738c4a4d850040b36d727f4b6c6db2d", &(0x7f0000000300)=""/30) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000040)={0x8, 0x4}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:28 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:28 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:28 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000000)) 23:52:28 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x900, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:28 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:28 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) mq_timedsend(r0, &(0x7f0000000040)="78bf92db4c9ea6e0de23a4ada8a623ef238c7c46e87b61c04ecaa4ef825c8ff325d116e5592e088aa60c4f08d767e3de4b51369f4bdb2d7b12de99ed5eaac6bc3a7cb474f68148edfdcdccb783684950889dd4c42bd8d12e85637f3737e502fefe2c5bc31ac01918bb64588538bc1520c4bca9d68e75696e", 0x78, 0x9, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = request_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='-\x00', 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000240)={r1, 0x65, 0x1e}, 0x0, &(0x7f0000000280)="b283c6015270b85fe1d6f8a986431be9201866533f1ceae044e6538f93bf327c8c5246050945a7d6475762c80ad4bf6af126b768fdc966275e025287e5be71e0139f3956cdfa636a14be24ccb6fc4064285db448397738c4a4d850040b36d727f4b6c6db2d", &(0x7f0000000300)=""/30) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:28 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)='syz', 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYRES64=r1], 0x1, 0xfffffffffffffff8) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40046432, &(0x7f0000000000)=0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000200)=0xe8) quotactl(0x9, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000240)="bf65ac68ade196a14aa2395af13614bfeabea5c02817ba519dd352") add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000013c0)=0xffffffffffffffff, 0x4) request_key(&(0x7f0000001240)='pkcs7_test\x00', &(0x7f0000001280)={'syz', 0x0}, &(0x7f00000012c0)='wlan0!em1\x00', 0xfffffffffffffff9) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000001440)={0xdd3a6b9f355604a, r0}) r1 = request_key(&(0x7f0000001300)='dns_resolver\x00', &(0x7f0000001340)={'syz', 0x3}, &(0x7f0000001380)='encrypted\x00', 0xfffffffffffffffb) keyctl$instantiate(0xc, r1, &(0x7f0000001400)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'encrypted\x00', 0x20, 0xc5a0}, 0x6, 0xffffffffffffffff) r2 = semget$private(0x0, 0x3, 0xe2) semctl$GETPID(r2, 0x2, 0xb, &(0x7f0000000040)=""/129) r3 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$search(0xa, r3, &(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, r3) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/llc\x00') ioctl$EVIOCGABS0(r4, 0x80184540, &(0x7f0000000240)=""/4096) 23:52:28 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:28 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400001, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000001c0)={'raw\x00', 0x1000, "c8e68dcd50349c88d3fcd00be5ab4a835d65e151aefd56aa8810fa20c8b485a4ce44e5af37d9cfdc5cd7617db783aa250d85d552674431058e1207d7eb383e16cef4b13e3db5a6d436aa7301ea5fc92cdeff0dfd1e1868216bc04d0533f214557cb4b8d9f8effccf7e1003ef42762d0b1960a7a99c6def9bd6a1bb28b704c082d542629d88da0665f9123fbb1918ed9c94c8592d8391f3bd3d7b18df437fc75cfce94a041a20510d0853a8385d429ca43f8aa650e7ecab422ce728eec532870c976c97ff1afd03373858c692022d49856364b4895e6054fe26dfcdb4e57d55ada7c8ef9daf07b1c292a7293ee9f462fe35b5ba06678833dc93435f4ba41cb774a27524505a4d790264f98444b3ecc8f5f17a7759ae77945135ddde95d5e7680b7e4bff2f5605b33d8e85f6d6b1b26a2a70e055d8d1e071850a7d8a8488cd48d829ecb76ed58d5833f0d94d67a864049ac101b1113a78c63c9d528a5e416e3674390a2ffb6769265530c7f65238d7d85d5562992db3fe6b1ae0e6128188039b0d12bca77a57890a3a3ef2803e6bac004996451e1558eb6a50da8aa7d1a44a9c8ded1124183b75235ac16cc443a93d63e040103f5b093073981183565ac2159634712f79eeb4babe123c78397c0a70515314e79fc7b342c3d0071e852b88de6f0cffef11d29720334ebe47256d478b9006b4033878cc7cb2cc63eb72bad7eb8f6b98a97eb44f334a8e807cc487a61770764c5ad86f3073f3c2153068eb67038458d8a0260537b405d30bd8a99c3a66e88fe6fc6b1e534383a0ae668563aaaf719cf51c1625f078c837a399d534382979e3059bb264119e36db7704be068c5b96cc804fcf0146d60099386d5d6f098bf193da1a5bddf8be13ae652be7be06bd7ca7a13a12d00783dac8f24263c9053329a992e80e0ebe888e984c45ca6c77a9c2cf3d48835bcbffbfa0fa4e8c91306e767b8dfb0f4330a3968e1b0e71f835be93e095f8ea384b0500f1a8147298d1ef21af9419d8165ca45594b3f7a0f181caf22696768427a2b9a7bce246da9f44767b03d4581c94648bdd71c9d62668ec0ee78ceffe0752981e89ba200c24d0fd748fcef63ffa65a0fb757675a96a89b92d2407e2e45af36c34aa2b1adbc26a18b089e8bc8c2a84658bb32bb3d88d8e1a8f149057d6991a2605061547d8a56e570daea751af227dad23555b7a02e47a51ef9d1c582aeb0cb28ba09ad4fb4872f254518746f7a97d78da2836771603335772976fdfda49b2e3abfba1345c01997171e8ec88f613e4b17908e5457dc7ec974e0c52964a56e49b17bc7e719aad73d17b4384d1ee5abed3913b5df284accdff67e2b085bcf677ac56f8c7561161a9cf0e1ce8432e269e37b71fe0d8bb96fb9c6dfc336c3b93309f66de948733360b9d8114896cb58cdd130c0a824789187ee9e0036815f970570a87e59fdd8e1ad0a650ef289d2f5a10830cb69b3d7666e6e593a800fe702eae205f0db1efaf2575f90b8138ef81ac0d362f04b14aa0074b4987bd88d7cd5fc1a498d97273d846d519ab96c893904e6697d8d26a00ba927c59e6784650d06372b0f8b2d5d83f8a8b91c165ea7631991c7fa54db5cb3ce6b07577ac2a286cfce0327eae340f20b33d9a3f017d6c4af99df6664baa08b9bfac49e30ddd089e1b035c79b0ab7e1ab2ff16113111ee48af6882d1f2338330a03acf6747c4d4a0f0a095d42a74cb50f4b659f1fbbdcae19aee36c0055ef23ed068674cb5bd2355ff2d21127f12233c859c2ec5168f1c7b4952b82dff2ada51a0adb55f5152d1f01157ddd2ad05d0d31b48ed605b9064253ca1fba01601ad4e864f8f3a3084218867a51583fd5fb0b00e38d606433d19d7868a5375f3c1a98fa0a740ec3218ae74a94ec7deece7f8243f4bc2c48a92e1f462c34d8209a2499a4133e3013886c79ae2e7842193f276248a90f0e8b56e864a36046d266e287f43c944b9b5c847ced12506502ad168918ea7ff61ff6069b752f1626ce5aa610d9cafcdcdaecf595406651fa2fc7b9382ad2716b9f78a5f8c2b1cc927b1d52bae639403eeb32d8a3cd95562f3236cc72fcca3938e21ef8ebb7d1e697bbe0aa28ace834b28f061da9714937d9a326239baf4d742d94f383eb43639b0a62af7c48fea291dea3a18acda7360e56974ac71c487c47128f9e422412caee5e8192fa0897da01bb0d010e14d5a9ce9f7f4686c130ef7565eab2374b247269e5c3564d61a47abaaa5d33ab078ad0725f1310a7bf5df9b3d2854759fcd3a51bc5bd160337110a3292bc52da08b524c6c4a3321e731636ae884d229d6b521aa65f33bbcd168dd0b702499e9b4deb4f956637bd85dd7a5b8c3503bedb7c97ade5c3654db1b0998d9f1861e873837161496fb45581d3a5471c879647662e9a26dfcf875677c4d152a80fd313eda2ff09dcdc1d987ae6a39ef25c4539ea4bcd6f5d50741d83704167c180b3b4b17fbb85d50e729f21ac23e0c1e8b2a6dcd2591b189e4e5dc6af37aa02025e62c41dcd03a962956d575de41e93f2e1c4c06f58adbe2b75ca82fa265c194d86fbdb8c231cd44b9138dfaf17e33f90cab8ddbc2e749d2a9fd535babe3765fa2146946cab17448b0db4787129fe3d96fbc63572cc200c053f15ce4cc958d509d79a7478fde922f8f09d731068c58908a875691c5c8f3470d6134cf35b7b2fa22b5574b5e1dc7bfe9f19a6d817616e27768d6038b653e4ccc573c81ed774cf8af82539c2c73c8a63a233cd43f48e39bb511b1692c9ad9611805e8a1b77c8855cab1ea3dfdcc89f11e8c67dda1d7a51b69b3a0c42565f40af42f0206f2347ea8db8d9b6c75e2dc46ffd9aa6ac5ab15dd186ba50269ec1aca36918b00b6710bdacc5a84c2d48ab154865f795e181a905918af45b86cf9996148ff8184d97344d7f35ba689e04beccf052423d7fb45f850b5c8fd7835e09a4802c4b518c975c95ce96d8525ef5665e3040c370d4f82254faedb521e7d03621b72a7a0d6723cbcce1488693dca8ca86a35ff62216b9107b54a819ce8743ec37a48bfa960afa7a708609b68a3ec62b1eb3c76ce48dd2d0e11a546290a9284bb23f54dc7b4b42d21bcb5b1184fb0928a307ed6d2316188b5754d252220d77d3024789b56ade4e3720f61e2b13cbb780624943aec1a0422640c28f487a05fa7317d2ddb5ecfbbac47c9b552677f781fbb5785cc8ddaacaaf7cee3c94564e6543e139adbf4b3029f9c9bfc9fa3dc197e8215108eaec554283a853e43bd6e644187a9caeddcc673439b8e8b568a75a909c65a3bcfadecbec898092a91ff635fd620f411de5c28ee785e038c00dff83193318272f4df7856d5935487573baab6a1e049c9e1762a87f0a34b36da1c2feeb79a8b71471d7e175b7ceaea618e5fc8a66e5fc6dd2f04862d26e02507395e1941837d8ed5ba9adee3a0b4b4ee762b8b35355ae88fd1792c548cb1250f8cf3bb07cd6bff3cd5da549707917918094411b153de21daba9fc7efd952eff46db1ff69adbf2d4fcd5d3a3d73fc96b7747704aec01485c90921d1b71d87c27f3fe6bd26671a6ec748e046d18fbf328b55f3e4b76b88afc24e7a51f8a3a751366571d8affa7936d7af34fce53b52adad08d076f2df9b1bf8306642dc7e05362981ba3aee33a53631cb7d9e195e05412c1bb0da9d14bb8a3dd69f213c717496c5fe75453c1c1fcdbc4822d40356766f310348e54b5d6713fef596ea62b05faf0b19103567f666a9423f8f45184abcfa7c9388288819e28bf3ccf6f15c326f4691ea6faab4767484eab52b497f7edba823806f3fb48a854244ed830fa83f8a223a136681f01939661f9d21fc52a43a8c772d0af71d223f139f13471710661c19e256d3d1ba1b88de84fb2631cea423d48bdce1f0c2e4f57fd7b07c05e146d497ff5b60d9b699fc8a5312e74ee0c8c2cdeb89d16b79495c68367cfc0d678d45704adb06866fe8e95e81f4b003076ef1cc73573def08d472148d8493176ef59c355eeac3497d1774d607123489a6e9a6f9becae0626c6c60819400862ae6e31357a9ab94cf96f59a871817824a180a543ddb2ae5c9834fb7fbc16f4bc1719f5215130e1cc768616df6c2c449be24e7efa36c7a7e51bd11c0548509b3d2e1a7d61384f13c92efe354b139e08abf8a655d0146f54a46cba88753e012a3a4a8820bdc871cb1027037fd7a21bc4459a2fdc7e25ee5ca086139e21bdd492512a09ddb15a8a61cc192a99487311e2aa293fb517da8421e7a401ae1660d88825457aeca2a0deaf622734072ca39718f5fa596fac20d2ae6950e11828c5bcd3e3cda91eed25adf45d838e549993d11d09414f8065d7a8fedb7d94d09c41921bb9fdd5a5de5392556a69cc801c1e1ebbed08b6b8b54a9d6ef7209929c3edf28e4eca62eab2638a48806c986da27c9744758b9a5159fac9c8f4c3a1ea45cd693697beec05c8ba24d0294c3fc858eaaf56c31fdc34cff1ee3850fa6037c66262906263c2a1e192427b46d846348f22002a7cc31e6e9022e34cbdaa6aa6d9288d901c630fefc23ffbb3a8662eb76439b02e7a6fa1ef23cdfd002fd60d84afc6fb7a6a60902add2fb6e1a32ffc8e3255a6d8f3e5c5c9757a831cfa4db74358853271087d50241e36817edd3f0b49ecc1b39d201d23256eeab7c2aabadf982b6b8bc81379f30b934d674abd7ae4877a2297dc990e0151d660064d763fb77f8e8ac8428e1fa3012e9b44d61a7d2612b8dc03f538a44002ee8c21b15198b9147d8715ef0a0175f028bb009b0a50c061cf050c777c4b569fb97b00a10015026ef11a4c582aee6fe16607ab222ff34247d2651869671e9df8dcfe2df3c0b68361112133e0ddb2699f8abe9e22c03261bd983795bb2ad0fe323dce3048920d9e5e4dcf2a72c8daf453d92adc30462cf403285aa0b231ad1853cd84ee584bed51ae638b3e7c358464c34054bfc976a5ecdce0dc0b875cb8df9a5194c7abfd743bf1c682e0e4070e5336f1c49e5c3be872f266e69dee79aed330488d8b35eb87c77077edfbedd7a83dd0fde0b5c7f9ae2aa73a373fd16243566121719a07c0d10916355eb4f8f692dbc2ac60d1c26690d8ffe2906d727bbdc4caeba2cd3c8a1c1b4c739164293aa390e2b3cd3b93d8959fe5c804a01bd9636112210b5969fbfb68e9378bd8e045256a33b5677f5e348e69abf2c23745a96a7ec5c90ef676afc4c3de996470c2573cb47c5c7f43986d9d36af7f3fdd10e9846b2eea181d8553695c35ab9ac5e4759dbbb095c816b0b53a7b40dad513affe632c4e4ea2f3d0f3e80739d0818148611da2e10de25517948bb5aa9902e2018c11b924c52e8d00c3e6edb34f537c7dfb2f5ab12c94101e7443a8cb13d6ad5da7156ce359e5115bf6a69f5c2ae476ba51799e95604431339c0a3f2bba380c665d799761aeeae0d59df732da6e25a19a32026e2390e8534d27bd5f3b6bec37b8debc6c513d3f7dcc001de42185251165efcbe1e2f17d219a6b8565f80e372e94366dd8ffdd7b8fd64eb82dcb5153dcb385cc6ef46f884616d4d082e30bdf6871fe56773093cba4e59dfbfdf826bb14b5555c7b9d611de510e3c5e78cba9d69a976a74f92f87e20a52126b1b436951ee7125f8493d9fab327e613db2b3aa812422fcc2d753ba67916d5c7996c5b173d3e8e5e448245f9d523c4363fe9aee8eaf8570f168fdf3be625ce27ecd6dbcce3bfb3e5b133d363515d33259485fad51ea74ef961988f5ceca22c0291f69a4e497638ab69361e3615577"}, &(0x7f0000000040)=0x1024) [ 323.018441][T22065] encrypted_key: insufficient parameters specified [ 323.053804][T22061] encrypted_key: insufficient parameters specified 23:52:28 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0xffffffffffff8555, 0x7fff, 0x5}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) 23:52:28 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:28 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f00000001c0)) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064000461756c7420757365723a73797a203030303030b68d166130303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) 23:52:28 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) [ 323.067718][T22061] encrypted_key: insufficient parameters specified [ 323.084206][T22065] encrypted_key: insufficient parameters specified 23:52:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723c1f110000000000303030000030303030303030303430393600"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:28 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) [ 323.245714][T22089] encrypted_key: insufficient parameters specified [ 323.252422][T22090] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:28 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 323.290454][T22096] encrypted_key: master key parameter 'user<' is invalid [ 323.311725][T22101] encrypted_key: master key parameter 'user<' is invalid [ 323.332882][T22099] encrypted_key: insufficient parameters specified 23:52:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20\x00', 0x111400, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000340)=[@mss={0x2, 0x100000000}, @sack_perm], 0x2) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$KVM_GET_SUPPORTED_CPUID(r1, 0xc008ae05, &(0x7f0000000040)=""/108) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0xba000000000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000200)={r2, 0x9, 0x9}, &(0x7f0000000240)=0x8) ioctl$VIDIOC_DQEVENT(r1, 0x80785659, &(0x7f0000000280)={0x0, @motion_det}) 23:52:29 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:29 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:29 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:29 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x5, 0x6, 0xfff}}, 0x28) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:29 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f00000001c0)) fspick(r0, &(0x7f0000000080)='./file0\x00', 0x1) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064000461756c7420757365723a73797a203030303030b68d166130303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000100)=0x8) 23:52:29 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a2030a8dce1adaa452001ce3a303030307f4ac3f57644bdd5f27b303030303030"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) mq_getsetattr(r1, &(0x7f00000001c0)={0x0, 0x4, 0x7fffffff, 0x2, 0x0, 0x3, 0x80000000, 0xffff}, &(0x7f0000000200)) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x1}) r3 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={r2, 0x80000, r3}) 23:52:29 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:29 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:29 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 323.671544][T22136] encrypted_key: insufficient parameters specified 23:52:29 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) [ 323.766393][T22139] encrypted_key: insufficient parameters specified 23:52:29 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:29 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000003c0)="5a465b44cf2882f99412935a7b6d92140b1ce9a099c44a19cd5133b22e775bd1f8dd3128a5b1b5ac111d271a3b857f8e027026bbcd549178a512697fd6e713eea9458395cb3cd2131adb742fda04b8bc9d0018cd447bfb285e23756d2100e364799942f100f324931e05be6ae852c6fcdaff502f690f24bf6bd59cc731d905685a0c57a24a3594578d0492bc25855f0b45b057a609d9a56476e45cb88cf8c295e23bd24e1c07914f11e8a05df205ed73fcd9d75ece346f6774a079725e330edcce2d81591172d5c641ef6bb20c481cfab2b28ffda3b4", 0xd6, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 323.829371][T22146] encrypted_key: insufficient parameters specified 23:52:29 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:29 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:29 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:29 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2c9, 0x3, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x1000000000, 0x0, 0x0, 0x10000000, 0x7ff, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000000000000000, 0x0, 0x1000, 0x2, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:s00000000004096\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x0, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000004c0), &(0x7f0000000500)=0x4) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f00000000c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1b000000", @ANYRES16=0x0, @ANYBLOB="00042bbd7000ffffff7f14000000180007000c000300400000000000000008000100010100002c00070008000100030000000c00030000000000000000000c000300080000000000000008000200000000002800060004000200040002000400020008000100050000000800010004000000040002000400020018000200080001006d4c000004000400080002000800000020000600040002000800010005000000080001009f23000004000200040002003000070008000100050000000c000400384b5d5d00000000080002000200000008000200000001000800020000000000240007000c00030003000000000000000c000400060000000000000008000100050000004801010034000200080002000601000008000200e0f0ffff0800020004a3000008000200ff000000080004000100008008000300020000002c0004001400010002004e22ac1414aa00000000000000001400020002004e23e0000001000000000000000038000400200001000a004e200000013d00000000000000000000ffffffffffff060000001400020002004e20ac1e0101000000000000000044000400200001000a004e20000000090000000000000000000000000000000101000000200002000a004e2200008fe6fe8000000000000000000000000000170600000044000400200001000a004e2400000009fe8000000000000000000000000000bb01000080200002000a004e2100000000fe800000000000000000000000000025b36f00001c00020008000200010000000800020001000000080001001800000008000300001000003400060004000200080001000000000008000100ffff000004000200040002000400020008000100000200000800010004000000"], 0x288}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) 23:52:29 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:29 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) sendto$inet(r0, &(0x7f00000002c0)="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", 0x1000, 0xc004, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x4, 0x10001, 0xffffffffffff7ff5}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 23:52:29 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 0000000000000000t096\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 324.046559][T22168] encrypted_key: keylen parameter is missing 23:52:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303030301030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 324.111916][T22172] encrypted_key: keylen parameter is missing 23:52:29 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl(r0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x200100, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000007c0)='/dev/vbi#\x00', 0x1, 0x2) write$UHID_CREATE2(r1, 0x0, 0xffffffffffffffb6) msgget(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000440)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000240)={0x0, 0x9, 0x1, {0xb, @pix={0x0, 0xffffffff00000001}}}) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000001c0)={0x0, 0x1, @start={0x0, 0x1}}) mmap$binder(&(0x7f0000ff8000/0x7000)=nil, 0x7000, 0x1, 0x11, r2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f00000000c0)=0x2, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000040)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000680)={{{@in=@remote, @in=@broadcast, 0x4e23, 0x2, 0x4e20, 0x12c000, 0xa, 0x20, 0x20, 0x11, r4, r5}, {0x1, 0x3, 0x7, 0x0, 0x0, 0x5, 0x800, 0x2}, {0xfffffffffffffffe, 0x200, 0x5, 0xb76}, 0x9, 0x6e6bb1, 0x2, 0x1, 0x2, 0x3}, {{@in6=@mcast2, 0x4d6, 0xff}, 0x0, @in6=@loopback, 0x3505, 0x4, 0x3, 0x3f, 0x3, 0x60c5bb4, 0x4}}, 0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) 23:52:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x8001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x9}, 0x8) 23:52:29 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:29 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:29 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:29 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='%\x00', 0xfffffffffffffffc) keyctl$instantiate(0xc, r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='new def0000000006\x00'/31], 0x2a, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:30 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:30 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) sendto$inet(r0, &(0x7f00000002c0)="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", 0x1000, 0xc004, &(0x7f0000000000)={0x2, 0x4e23, @empty}, 0x10) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000040)={0x4, 0x10001, 0xffffffffffff7ff5}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$RTC_AIE_ON(r1, 0x7001) 23:52:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='nev default user:syz 00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 324.407055][T22193] encrypted_key: insufficient parameters specified 23:52:30 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 324.448536][T22205] encrypted_key: insufficient parameters specified [ 324.469372][T22213] encrypted_key: insufficient parameters specified 23:52:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x8001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x9}, 0x8) 23:52:30 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:30 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x750, 0x2ac, 0x0, 0x0, 0x154, 0x2ac, 0x684, 0x684, 0x684, 0x684, 0x684, 0x6, &(0x7f0000000000), {[{{@uncond, 0x0, 0x110, 0x154, 0x0, {}, [@inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0xd}}, @inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x8}}]}, @common=@unspec=@IDLETIMER={0x44, 'IDLETIMER\x00', 0x0, {0x2, 'syz1\x00', 0x3f}}}, {{@ipv6={@remote, @dev={0xfe, 0x80, [], 0x15}, [0x0, 0x0, 0x0, 0xff], [0xffffff00, 0x0, 0x0, 0xffffff00], 'veth0_to_bridge\x00', 'nr0\x00', {0xff}, {0xff}, 0x33, 0x10000, 0x2, 0x4}, 0x0, 0x134, 0x158, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x7, 0x1, 0x1, [0x7ff, 0x2, 0x0, 0x1, 0xb, 0x5, 0x80, 0x5, 0x400, 0x3, 0x9, 0xfff, 0x8, 0x800, 0xfffffffffffffffd], 0x6}}, @inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x1}}]}, @inet=@TOS={0x24, 'TOS\x00', 0x0, {0x2000000000000}}}, {{@uncond, 0x0, 0x134, 0x164, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x1, 0x4, 0x1, [0x8, 0x7, 0x7, 0x1, 0x200, 0x6, 0x10000000000000, 0x0, 0x200, 0x6, 0x92adeb2, 0x81, 0x8001, 0xdb, 0xae, 0x36516e50], 0xd}}, @inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x4}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x9, 0xa9e, 0x4, 0x2}}}, {{@uncond, 0x0, 0x114, 0x158, 0x0, {}, [@common=@unspec=@pkttype={0x28, 'pkttype\x00', 0x0, {0x1}}, @inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x1}}]}, @DNPT={0x44, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@remote, 0x13, 0x24, 0x7f}}}, {{@uncond, 0x0, 0xf8, 0x11c, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0xfffffffffffff800, 0x2, 0x2, 0x8, 0x1}}]}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x7ac) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 324.558356][T22220] encrypted_key: keyword 'nev' not recognized [ 324.571948][T22223] encrypted_key: keyword 'nev' not recognized 23:52:30 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:30 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xffffffffffffffff) r1 = request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='%\x00', 0xfffffffffffffffc) keyctl$instantiate(0xc, r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='new def0000000006\x00'/31], 0x2a, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:30 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:30 executing program 3: request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='encrypted\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="6e657720370e5df85cb67108a1179669387d64656661756c7420757365723a73797a203030303030cb1b907cf69cc09a3030301234303b36b6a2263331a97b1cf510302e44369efdb2733fd76e585f71d37512b01f5ef236fceb5ab3ceb11be7b8f546ff6a72d5dd02060c454526299cab12b9eeb19e7fa15f9bdcbfb302c9910e93c77d1c4471eba07b6d8f45521035bad118448b6ea1dde2e1750cbe6b0760cbc8c0cc3cd4fd78a0685a92cde50cbf8e22514f6c44e6ad94cd469685335b4798e1529814"], 0xfffffffffffffc48, 0x0) socket$caif_stream(0x25, 0x1, 0x1) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000300)) 23:52:30 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2540, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/75, 0x4b) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000001c0)=""/4096) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:30 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="6e65771964656661756c742075736530303030303030303030303030303030010000800000000034b0e4c71f4fe87c4082d5411d1b"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/qat_adf_ctl\x00', 0x220000, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001680)=ANY=[@ANYBLOB="080000000000000000f00100000000009b00000000000000", @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/155], @ANYBLOB="000000000000000000000000000000000010000000000000", @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB="000000000000000000500000d300000000ef0000a5265ec5501be2cf5e82b71391ed040000000000", @ANYPTR64=&(0x7f00000012c0)=ANY=[@ANYBLOB='\x00'/239], @ANYBLOB="000000000000000000300100"/24, @ANYPTR64=&(0x7f00000000c0)=ANY=[], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00I\x00\x00\x00\x00\x00\x00\x00', @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/73], @ANYBLOB="000000000000000000100000000000003c00000000000000", @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/60], @ANYBLOB="00000000000000000400000000000000db00000000000000", @ANYPTR64=&(0x7f00000013c0)=ANY=[@ANYBLOB='\x00'/219], @ANYBLOB="000000000000000006701000000000000500000000000000", @ANYPTR64=&(0x7f00000014c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) pipe(&(0x7f0000001500)) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(r0, 0x0, 0xffffffffffffffe6) 23:52:30 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) [ 324.840332][T22249] encrypted_key: insufficient parameters specified [ 324.847088][T22241] encrypted_key: insufficient parameters specified 23:52:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a203030303030303030303030303030303067a0393600"], 0xfffffffffffffc48, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001340)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff2000/0xd000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000fee000/0xc000)=nil, &(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000340)="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", 0x1000, r0}, 0x68) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x1a0) epoll_pwait(r1, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x8, &(0x7f00000000c0), 0x8) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f00000002c0)={0xffffffffffffffff}, 0x1, {0xa, 0x4e20, 0x4d, @rand_addr="e537647eba7eabe13bab5bd0d2d289fe"}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000280)={0x11, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) openat$userio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/userio\x00', 0x121004, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:30 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 324.926515][T22259] encrypted_key: insufficient parameters specified 23:52:30 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c740700264073b600007a20303030303030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0xa, &(0x7f0000000000)='encrypted\x00'}, 0x28b) ptrace$setregset(0x4205, r1, 0x3, &(0x7f00000001c0)={&(0x7f0000000080)="05fca6e5b815f29a195103aba8354b8c4a25136c9ffb606ce29e4043de8d6c6dc04dd368afc4f45bc0c2ef780d9348351cde26a74aaf643b826d2a4e2d37ae3b158a79ce9be7bf44df09a0695c9eae0994106ace40589d6adf4925a4fbbf93148112f906816ea6b22906776009018c229048536c5eab21adcaef774680007ff4", 0x80}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000400)={{0x3, 0xb, 0x539, 0x6, 'syz0\x00', 0xffffffff}, 0x4, 0x3, 0x8, r1, 0x2, 0x10000000000000, 'syz0\x00\x00\x00\x00\x00\x00\x00;\xfd\x10\x99\xbc\xe1\x8a\x15\x00\x00\x00\x00\x00\x00\x00q\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xc1\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x00', &(0x7f0000000240)=['IPVS\x00', '/dev/snd/pcmC#D#c\x00'], 0x17, [], [0x8, 0x8000, 0x3, 0x4]}) r3 = syz_open_dev$sndpcmc(&(0x7f0000002f40)='/dev/snd/pcmC#D#c\x00', 0x400, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002fc0)='IPVS\x00') ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f00000002c0)={0x34, 0x0, &(0x7f0000000280)}) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000003080)={&(0x7f0000002f80), 0xc, &(0x7f0000003040)={&(0x7f0000000300)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="000829bd7000fcdbdf250900000008000500050000000800040001000100080004000f00000008000600090000000800050007000000be927397c7908c3ff243fe4d142eda2dcb12617679f4224b92e5bee7035ba1f3e4a51d5d31fe68c9a669d1a93567a600db55ab2e8ff35b10b15292fd79e3dd763e829b3799f6023b58c6cbacd4483beb9594e5e23c3e3bcf3f9fa1860d6fd3bd7b5c2ee491c0993576332a21db94aa97f132d7c275d726baff78da215a29e609797c4b226a5ebd20442d985a46bef0e1ba260796bafd0d8b7a655b8f09db06484d4f8625f2d8f9b30f3ea871451f50002b61cec47b09bde2"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x800) 23:52:30 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) [ 324.999312][T22255] encrypted_key: insufficient parameters specified 23:52:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SECCOMP(0x15) keyctl$instantiate(0xc, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6e657773797a203030303030303030303000f80000000000000000000000000074b047c328283b70f02f91478c2d28c5c9043f2a73ae0f7537d5414bf4625d6a00d603072d39c541f47b7b009fa684000000000000f2279c758f538b8c1bbc0256556438e1bf1b0db6a29aa833711341fc55fedb59f4b7cfb5a5810824c414756a679b1540681a7b9ecbad899adc650e148f5dae3cd1ff2e06abe6e3247b3fda156097796248000000000000000000004f7c46d0e112ef5a288d100b4eeb52ec5c55e32c705410c33cf55266e7f2acce9357c12ca051e327bd18e249d4d501"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000100), 0xffffffffffffffc3, 0xfffffffffffffffe) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/1) 23:52:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0xffffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}, 0x2b, 0x6, 0x6, 0x929b, 0x80}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r2, 0x4, 0xffffffff00000000}, 0xc) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:30 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 325.054830][T22267] encrypted_key: insufficient parameters specified [ 325.073516][T22271] encrypted_key: master key parameter 'default' is invalid 23:52:30 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000001c0)="e4e1b4d61ee9ed3da91f2f09da823b220a420a95d78d5213d6b2632936520ceaf43e2dbb28800b31cbcd4dc28955d30d6ecb2a9fdbf0bb7d60bc1fa02957875a5f4fb368c4d86c558ef38fb99fe7a8cd8ec00694e1bd9cce7d61e85f275e4b2bfb8eb5432a29703176b9fa81a3fad6093360105a8465661247091a0a743a291331a2b564a98b8c7db66e2a0868bdc4cfaa0ab21b734686f77a1f35a477e558492df1f1bb463a9ff5", 0xa8, r2) r3 = add_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000380)="13c209cff1e299dc1e2bb8b02d7fa1e4df9949106d359cbabe7b742edb6f01fa0b512ce4e91ca86ef0adaeb8cef5621ff48f006d83a98f4dceb3829e62898622165688f8b4493526e72680e376a2116070e3f054b48806154fe386ea327a4251741b57adaeeaf5b7d839a2fe2ca3d96d8a943dd60310e6f1690652b10a67d264c304ff8eb55619128b69060ba1bdcb03", 0x90, r2) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000006c0)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000005c0)="83a18936b53fa2cd34472e71faae537dd8bd3af6dd1961c257ce0b7c6c04ef3657ce3532ecb8aaa5ba5bb609fde4af59c8532cdc9153f2359d68172b623e53ddded96a2fb3ad61def6913ee4e47026df26b45e6e1bd1224e39723bd4d9a2c3905c435e48f63a7f429e98e9ab0abc0dbb99d77e8e6c14a517ded5235418d0c853cd6166f6d7aed1683b6b58090714d06622d34c5080027539a4b93a704b16734265ce3bf715026408ba4ff03a277353bb1cb1a853888e63ddfef9165dacd35248c3d3f7edbc3090c0c8987be4f81c99b3e9d4ffc569f729232db42d5a11707654e31b8120fe7876ac9744b6fd", 0xec, r1}, 0x68) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) keyctl$invalidate(0x15, r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(r0, 0x0, 0x2e3) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f00000008c0)) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000740)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000880)={&(0x7f0000000300), 0xc, &(0x7f0000000840)={&(0x7f0000000780)={0xac, r4, 0x202, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x78, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0xa}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @local}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) 23:52:30 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400200, 0x0) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000080)={0x5, 0x3, 0x5, 0xfff, 0xfff, "0bb0d488aaab35d39c7f5f886e72dbd8b2b2a0", 0x6, 0x100}) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f00000000c0)='\x00', &(0x7f00000001c0)) 23:52:30 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:30 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:30 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'memory'}]}, 0x8) [ 325.214217][T22287] encrypted_key: insufficient parameters specified 23:52:30 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 325.304183][T22294] encrypted_key: keyword 'new' not allowed when called from .update method [ 325.316018][T22287] encrypted_key: insufficient parameters specified 23:52:31 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 325.378882][T22305] FAULT_INJECTION: forcing a failure. [ 325.378882][T22305] name failslab, interval 1, probability 0, space 0, times 0 [ 325.397796][T22305] CPU: 0 PID: 22305 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 325.405802][T22305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.417321][T22305] Call Trace: [ 325.420625][T22305] dump_stack+0x172/0x1f0 23:52:31 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) [ 325.424965][T22305] should_fail.cold+0xa/0x15 [ 325.429566][T22305] ? refcount_dec_not_one+0x1f0/0x1f0 [ 325.434944][T22305] ? fault_create_debugfs_attr+0x180/0x180 [ 325.440772][T22305] ? page_to_nid.part.0+0x20/0x20 [ 325.440788][T22305] ? ___might_sleep+0x163/0x280 [ 325.440807][T22305] __should_failslab+0x121/0x190 [ 325.455577][T22305] should_failslab+0x9/0x14 [ 325.460088][T22305] __kmalloc_track_caller+0x2dc/0x760 [ 325.465459][T22305] ? __check_object_size+0x3d/0x43c [ 325.465475][T22305] ? wait_for_completion+0x440/0x440 23:52:31 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303030303030303030303030303030303430393600b69186783ad9e266b36ed788acaa4f68ab48e7b787347d7621e462ca0d2c2e31146b0235ff7f010093ff7393ed32705d7f739f7b9d45c61f039777caf6c10f51c91d81a8fcb332afb3790b"], 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) io_uring_enter(r0, 0x2, 0x2, 0x96f11ffdf2f35796, &(0x7f00000000c0)={0x912}, 0x8) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000100)={0x0, r0}) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x24688f60) [ 325.465493][T22305] ? strndup_user+0x77/0xd0 [ 325.480428][T22305] memdup_user+0x26/0xb0 [ 325.484668][T22305] strndup_user+0x77/0xd0 [ 325.488998][T22305] __ia32_sys_add_key+0x1a2/0x4f0 [ 325.494026][T22305] ? __x64_sys_add_key+0x4f0/0x4f0 [ 325.499152][T22305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.505390][T22305] ? entry_SYSENTER_compat+0x68/0x7f [ 325.510676][T22305] ? trace_hardirqs_on+0x67/0x240 [ 325.515702][T22305] do_fast_syscall_32+0x27b/0xdb3 [ 325.520722][T22305] entry_SYSENTER_compat+0x70/0x7f 23:52:31 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:31 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) [ 325.525815][T22305] RIP: 0023:0xf7f069c9 [ 325.529881][T22305] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 325.549488][T22305] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 325.557905][T22305] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 325.565879][T22305] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe 23:52:31 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 325.574844][T22305] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 325.582810][T22305] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 325.582818][T22305] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:31 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:31 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) [ 325.624859][T22319] encrypted_key: insufficient parameters specified [ 325.658175][T22324] FAULT_INJECTION: forcing a failure. [ 325.658175][T22324] name failslab, interval 1, probability 0, space 0, times 0 [ 325.660235][T22325] encrypted_key: insufficient parameters specified 23:52:31 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:31 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) [ 325.726618][T22324] CPU: 0 PID: 22324 Comm: syz-executor.4 Not tainted 5.3.0-rc1+ #80 [ 325.734633][T22324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.744684][T22324] Call Trace: [ 325.744707][T22324] dump_stack+0x172/0x1f0 [ 325.744726][T22324] should_fail.cold+0xa/0x15 [ 325.744747][T22324] ? fault_create_debugfs_attr+0x180/0x180 [ 325.762719][T22324] ? ___might_sleep+0x163/0x280 [ 325.767577][T22324] __should_failslab+0x121/0x190 [ 325.772515][T22324] should_failslab+0x9/0x14 [ 325.777012][T22324] __kmalloc+0x2e0/0x770 [ 325.781251][T22324] ? mark_held_locks+0xf0/0xf0 [ 325.786024][T22324] ? _parse_integer+0x190/0x190 [ 325.790877][T22324] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 325.796601][T22324] tomoyo_realpath_from_path+0xcd/0x7b0 [ 325.802153][T22324] ? tomoyo_path_number_perm+0x193/0x520 [ 325.807793][T22324] tomoyo_path_number_perm+0x1dd/0x520 [ 325.813258][T22324] ? tomoyo_path_number_perm+0x193/0x520 [ 325.818893][T22324] ? tomoyo_execute_permission+0x4a0/0x4a0 23:52:31 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:31 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:31 executing program 0 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 325.824887][T22324] ? __kasan_check_read+0x11/0x20 [ 325.829922][T22324] ? __fget+0x384/0x560 [ 325.834082][T22324] ? ksys_dup3+0x3e0/0x3e0 [ 325.838493][T22324] ? fput_many+0x12c/0x1a0 [ 325.838510][T22324] tomoyo_file_ioctl+0x23/0x30 [ 325.838523][T22324] security_file_ioctl+0x77/0xc0 [ 325.838540][T22324] __ia32_compat_sys_ioctl+0xcc/0x620 [ 325.838557][T22324] do_fast_syscall_32+0x27b/0xdb3 [ 325.838579][T22324] entry_SYSENTER_compat+0x70/0x7f [ 325.863060][T22324] RIP: 0023:0xf7f509c9 23:52:31 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xaf, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e657720646566f95a8fdc616961756c7420757365723a73797a20303030303030303030303030303051303430"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000100), 0x47d, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40100) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x3, 0x10000) [ 325.863075][T22324] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 325.863083][T22324] RSP: 002b:00000000f5d4c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 325.863096][T22324] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000400455c8 [ 325.863103][T22324] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 325.863109][T22324] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 23:52:31 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) [ 325.863116][T22324] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 325.863123][T22324] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 325.908061][T22324] ERROR: Out of memory at tomoyo_realpath_from_path. [ 325.939985][T22343] FAULT_INJECTION: forcing a failure. [ 325.939985][T22343] name failslab, interval 1, probability 0, space 0, times 0 [ 325.958780][T22345] encrypted_key: insufficient parameters specified [ 325.966468][T22343] CPU: 1 PID: 22343 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 325.974646][T22343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.982585][T22349] encrypted_key: insufficient parameters specified [ 325.984692][T22343] Call Trace: [ 325.984714][T22343] dump_stack+0x172/0x1f0 [ 325.984738][T22343] should_fail.cold+0xa/0x15 [ 326.003378][T22343] ? fault_create_debugfs_attr+0x180/0x180 [ 326.009186][T22343] ? page_to_nid.part.0+0x20/0x20 [ 326.014387][T22343] ? ___might_sleep+0x163/0x280 [ 326.019311][T22343] __should_failslab+0x121/0x190 [ 326.024242][T22343] should_failslab+0x9/0x14 [ 326.028724][T22343] kmem_cache_alloc_node_trace+0x274/0x750 [ 326.034510][T22343] __kmalloc_node+0x3d/0x70 [ 326.039004][T22343] kvmalloc_node+0x68/0x100 [ 326.043487][T22343] __ia32_sys_add_key+0x3d5/0x4f0 [ 326.048491][T22343] ? __x64_sys_add_key+0x4f0/0x4f0 [ 326.053582][T22343] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.059804][T22343] ? entry_SYSENTER_compat+0x68/0x7f [ 326.065066][T22343] ? trace_hardirqs_on+0x67/0x240 [ 326.070074][T22343] do_fast_syscall_32+0x27b/0xdb3 [ 326.075077][T22343] entry_SYSENTER_compat+0x70/0x7f [ 326.080166][T22343] RIP: 0023:0xf7f069c9 [ 326.084217][T22343] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 326.103799][T22343] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 326.112194][T22343] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 326.120143][T22343] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe 23:52:31 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 000000000\t\x00\x00\x00\x00\x00\x004096\x00'], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 326.128100][T22343] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 326.136048][T22343] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 326.143998][T22343] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 326.163675][T22347] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:31 executing program 4 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:52:31 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:31 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffc8b, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000080)="7ad056eb9d5988001217a70fa827d0177b80957d7d9e01ce1218feb9bd7bd1d7b4b6d8cfaa3dd48c758709cda852df64", 0x30, 0xfffffffffffffffe) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x4129c0, 0x0) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000340)={0x6, 0x10}) r2 = syz_open_dev$adsp(&(0x7f0000000400)='/dev/adsp#\x00', 0x7, 0x60100) perf_event_open$cgroup(&(0x7f0000000380)={0x2, 0x70, 0x6, 0x4, 0x1, 0xde8, 0x0, 0x800, 0x10000, 0x8, 0x1, 0x4, 0x80000000, 0xffff, 0x7, 0x8, 0x9, 0x10000, 0x6e7b, 0x7, 0xebd, 0xef5, 0x1, 0x5, 0x0, 0xab5, 0x6, 0x1380000000000000, 0x2, 0x8, 0x40, 0x7f800000000, 0x7, 0x8, 0x5, 0x6, 0x5, 0x3, 0x0, 0x4a, 0x0, @perf_config_ext={0xeb}, 0x35404, 0x5, 0xfffffffffffeffff, 0x4, 0x2, 0x6, 0x800}, r1, 0xb, r0, 0xa) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000100)=""/2) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) socket(0x5, 0x807, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f00000001c0)={0x2, 0x57a3, 0x1f, 0x0, 0x0, [], [], [], 0x2d46, 0x1}) 23:52:31 executing program 0 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:32 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 326.358233][T22364] encrypted_key: insufficient parameters specified 23:52:32 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:32 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) [ 326.409768][T22371] FAULT_INJECTION: forcing a failure. [ 326.409768][T22371] name failslab, interval 1, probability 0, space 0, times 0 [ 326.482660][T22373] FAULT_INJECTION: forcing a failure. [ 326.482660][T22373] name failslab, interval 1, probability 0, space 0, times 0 [ 326.502722][T22371] CPU: 0 PID: 22371 Comm: syz-executor.4 Not tainted 5.3.0-rc1+ #80 [ 326.503496][T22374] encrypted_key: insufficient parameters specified [ 326.510725][T22371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.510732][T22371] Call Trace: 23:52:32 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:32 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) [ 326.510756][T22371] dump_stack+0x172/0x1f0 [ 326.510778][T22371] should_fail.cold+0xa/0x15 [ 326.510794][T22371] ? fault_create_debugfs_attr+0x180/0x180 [ 326.510812][T22371] ? ___might_sleep+0x163/0x280 [ 326.510828][T22371] __should_failslab+0x121/0x190 [ 326.510848][T22371] should_failslab+0x9/0x14 [ 326.545409][T22371] __kmalloc+0x2e0/0x770 [ 326.555153][T22371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.555172][T22371] ? d_absolute_path+0x11b/0x170 [ 326.575013][T22371] ? __d_path+0x140/0x140 23:52:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x5ab5241c1d4869e, 0x0) [ 326.579342][T22371] ? tomoyo_encode2.part.0+0xf5/0x400 [ 326.584738][T22371] tomoyo_encode2.part.0+0xf5/0x400 [ 326.589931][T22371] tomoyo_encode+0x2b/0x50 [ 326.589943][T22371] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 326.589963][T22371] tomoyo_path_number_perm+0x1dd/0x520 [ 326.589980][T22371] ? tomoyo_path_number_perm+0x193/0x520 [ 326.611437][T22371] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 326.611456][T22371] ? __kasan_check_read+0x11/0x20 [ 326.622272][T22371] ? __fget+0x384/0x560 [ 326.626431][T22371] ? ksys_dup3+0x3e0/0x3e0 [ 326.630846][T22371] ? fput_many+0x12c/0x1a0 [ 326.635271][T22371] tomoyo_file_ioctl+0x23/0x30 [ 326.640041][T22371] security_file_ioctl+0x77/0xc0 [ 326.644973][T22371] __ia32_compat_sys_ioctl+0xcc/0x620 [ 326.650337][T22371] do_fast_syscall_32+0x27b/0xdb3 [ 326.650353][T22371] entry_SYSENTER_compat+0x70/0x7f [ 326.650362][T22371] RIP: 0023:0xf7f509c9 23:52:32 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) [ 326.650374][T22371] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 326.650379][T22371] RSP: 002b:00000000f5d4c0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 326.692791][T22371] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000400455c8 [ 326.700765][T22371] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 [ 326.708735][T22371] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 326.716702][T22371] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 326.724668][T22371] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 326.751548][T22373] CPU: 0 PID: 22373 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 326.759542][T22373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.769585][T22373] Call Trace: [ 326.769609][T22373] dump_stack+0x172/0x1f0 [ 326.769632][T22373] should_fail.cold+0xa/0x15 [ 326.777668][T22371] ERROR: Out of memory at tomoyo_realpath_from_path. [ 326.781794][T22373] ? __kmalloc_node+0x3d/0x70 [ 326.793357][T22373] ? fault_create_debugfs_attr+0x180/0x180 [ 326.793377][T22373] ? page_to_nid.part.0+0x20/0x20 [ 326.804159][T22373] ? ___might_sleep+0x163/0x280 [ 326.809015][T22373] __should_failslab+0x121/0x190 [ 326.813957][T22373] should_failslab+0x9/0x14 [ 326.818462][T22373] kmem_cache_alloc+0x2aa/0x710 [ 326.823311][T22373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.823331][T22373] ? __validate_process_creds+0x22d/0x380 [ 326.835253][T22373] prepare_creds+0x3e/0x430 [ 326.839762][T22373] lookup_user_key+0x3f8/0xfb0 [ 326.844522][T22373] ? join_session_keyring+0x340/0x340 [ 326.844541][T22373] ? retint_kernel+0x2b/0x2b [ 326.854471][T22373] ? key_validate+0x100/0x100 [ 326.859160][T22373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 326.865404][T22373] ? _copy_from_user+0x12c/0x1a0 [ 326.870346][T22373] __ia32_sys_add_key+0x277/0x4f0 [ 326.875364][T22373] ? __x64_sys_add_key+0x4f0/0x4f0 [ 326.875378][T22373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.875396][T22373] ? entry_SYSENTER_compat+0x68/0x7f [ 326.891992][T22373] ? trace_hardirqs_on+0x67/0x240 [ 326.897016][T22373] do_fast_syscall_32+0x27b/0xdb3 [ 326.897036][T22373] entry_SYSENTER_compat+0x70/0x7f [ 326.907126][T22373] RIP: 0023:0xf7f069c9 [ 326.911196][T22373] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 326.930797][T22373] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 326.930810][T22373] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 326.930818][T22373] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 326.930825][T22373] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 326.930831][T22373] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 326.930844][T22373] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:32 executing program 4 (fault-call:2 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 23:52:32 executing program 3 (fault-call:5 fault-nth:0): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:32 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:32 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x573, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) io_setup(0x1000, &(0x7f0000000080)=0x0) io_submit(r3, 0x5, &(0x7f0000001600)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x2, r2, &(0x7f00000000c0), 0x0, 0x9, 0x0, 0x1, r0}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x2, r0, &(0x7f00000002c0)="040e3a3d017ec9cbd574ee332c9ac1e237da5cba760ec4fed2626fa3e5e595abaf32859d19ed15d47b8547a9405ac6fb048b593200d996013cbff2bf0b6baf548ce4de22241732a7e69800b33dc049e4f6a35787e9b31d69d3e488a2d6de559a891140c553f62ab6b0cc0196fac01d3da725744e5d768fb4cea66e320808e0556904cc339deaa192082d77c9bc83050248a526a9accd4c94476a7c1fdb2b72c39a9a2a9cbe6332578697fecaa18bb8d35f07ed0615d92060eeabb9286ae7d7de364037a3c2dc24b55dbc0363ea04150a1b3042e2d8a22a20f0e85d9e0fde5a41fbdfa989583cda4813f5", 0xea, 0x7, 0x0, 0x0, r0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x6, r0, &(0x7f00000003c0)="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", 0xff, 0x20, 0x0, 0x3, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f00000004c0)="94f35d3dccdcd69f578195f50ccfe1f2a087b7edbad2917e8e13a72bb0817bebc8438eba30f2a359fe1907b7cefa6c70b30bb959a8461e6407d21895d52d0afc15d35022b7c7ca534ba518e57f8ded9f667ac1cb21fb1d2954f7dfc70979ea600a46c9ee1e0a0aeb4de2761c00e1a619c3d5c5ea5eb3ff7d9c065894af1d3ead23c3a306bae7827c63bf53652954cebf", 0x90, 0x3f, 0x0, 0x2, r0}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0xa5ca69c2f4e94d5c, 0x401, r1, &(0x7f00000005c0)="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", 0x1000, 0xa1, 0x0, 0x0, r1}]) ioctl$FS_IOC_SETFLAGS(r1, 0x40046602, &(0x7f0000000040)) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000001640)=ANY=[@ANYBLOB="bdffffff10000000320000000000000005000000f9ffffff3f76c04b489a14d4a7085062ee3ecfa386041db48dd8647191b70ac233e780803c632a8a20e557542309d61561e24fef1bd9980856dccc82c3aa791c63"]) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:32 executing program 0 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:32 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) [ 327.069091][T22413] FAULT_INJECTION: forcing a failure. [ 327.069091][T22413] name failslab, interval 1, probability 0, space 0, times 0 [ 327.094234][T22413] CPU: 1 PID: 22413 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 327.102510][T22413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.112560][T22413] Call Trace: [ 327.115856][T22413] dump_stack+0x172/0x1f0 [ 327.120196][T22413] should_fail.cold+0xa/0x15 [ 327.124790][T22413] ? fault_create_debugfs_attr+0x180/0x180 [ 327.130603][T22413] ? page_to_nid.part.0+0x20/0x20 [ 327.135623][T22413] ? ___might_sleep+0x163/0x280 [ 327.140466][T22413] __should_failslab+0x121/0x190 [ 327.140481][T22413] should_failslab+0x9/0x14 [ 327.140497][T22413] __kmalloc+0x2e0/0x770 [ 327.154254][T22413] ? refcount_inc_not_zero_checked+0x144/0x200 [ 327.160415][T22413] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 327.166308][T22413] ? security_prepare_creds+0x11d/0x190 [ 327.171861][T22413] security_prepare_creds+0x11d/0x190 [ 327.177238][T22413] prepare_creds+0x32a/0x430 [ 327.181834][T22413] lookup_user_key+0x3f8/0xfb0 [ 327.186598][T22413] ? join_session_keyring+0x340/0x340 [ 327.191973][T22413] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 327.197790][T22413] ? lock_downgrade+0x920/0x920 [ 327.198249][T22416] FAULT_INJECTION: forcing a failure. [ 327.198249][T22416] name failslab, interval 1, probability 0, space 0, times 0 [ 327.202752][T22413] ? key_validate+0x100/0x100 [ 327.219979][T22413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.226244][T22413] ? _copy_from_user+0x12c/0x1a0 [ 327.231179][T22413] __ia32_sys_add_key+0x277/0x4f0 [ 327.236194][T22413] ? __x64_sys_add_key+0x4f0/0x4f0 [ 327.241393][T22413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.247623][T22413] ? entry_SYSENTER_compat+0x68/0x7f [ 327.253014][T22413] ? trace_hardirqs_on+0x67/0x240 [ 327.258030][T22413] do_fast_syscall_32+0x27b/0xdb3 [ 327.263044][T22413] entry_SYSENTER_compat+0x70/0x7f [ 327.268143][T22413] RIP: 0023:0xf7f069c9 [ 327.272204][T22413] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 327.291806][T22413] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 327.300313][T22413] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 327.308288][T22413] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe 23:52:32 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) [ 327.316249][T22413] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 327.324206][T22413] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 327.332164][T22413] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 327.340311][T22416] CPU: 0 PID: 22416 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #80 [ 327.348295][T22416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.358432][T22416] Call Trace: [ 327.361724][T22416] dump_stack+0x172/0x1f0 23:52:33 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:33 executing program 0 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 327.366053][T22416] should_fail.cold+0xa/0x15 [ 327.370645][T22416] ? fault_create_debugfs_attr+0x180/0x180 [ 327.376452][T22416] ? page_to_nid.part.0+0x20/0x20 [ 327.381477][T22416] ? ___might_sleep+0x163/0x280 [ 327.386634][T22416] __should_failslab+0x121/0x190 [ 327.391574][T22416] should_failslab+0x9/0x14 [ 327.396078][T22416] kmem_cache_alloc_node+0x268/0x740 [ 327.401373][T22416] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 327.408295][T22416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.414574][T22416] ? tcp_established_options+0x29d/0x4d0 23:52:33 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 327.420246][T22416] __alloc_skb+0xd5/0x5e0 [ 327.420264][T22416] ? netdev_alloc_frag+0x1b0/0x1b0 [ 327.429721][T22416] sk_stream_alloc_skb+0x2d2/0xc60 [ 327.435803][T22416] tcp_sendmsg_locked+0xca4/0x38d0 [ 327.435823][T22416] ? lock_downgrade+0x920/0x920 [ 327.446365][T22416] ? tcp_sendpage+0x60/0x60 [ 327.450955][T22416] ? trace_hardirqs_on+0x67/0x240 [ 327.455974][T22416] ? lock_sock_nested+0x9a/0x120 [ 327.460911][T22416] ? __local_bh_enable_ip+0x15a/0x270 [ 327.466292][T22416] tcp_sendmsg+0x30/0x50 23:52:33 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 327.471509][T22416] inet_sendmsg+0x9e/0xe0 [ 327.477140][T22416] ? inet_send_prepare+0x4f0/0x4f0 [ 327.482310][T22416] sock_sendmsg+0xd7/0x130 [ 327.486730][T22416] __sys_sendto+0x262/0x380 [ 327.491238][T22416] ? __ia32_sys_getpeername+0xb0/0xb0 [ 327.496612][T22416] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 327.502175][T22416] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 327.508413][T22416] ? fput_many+0x12c/0x1a0 [ 327.512829][T22416] ? fput+0x1b/0x20 [ 327.516648][T22416] ? ksys_write+0x1cf/0x290 [ 327.521332][T22416] ? __ia32_sys_read+0xb0/0xb0 [ 327.526101][T22416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.527402][T22433] FAULT_INJECTION: forcing a failure. [ 327.527402][T22433] name failslab, interval 1, probability 0, space 0, times 0 [ 327.532340][T22416] __ia32_sys_sendto+0xdf/0x1a0 [ 327.532361][T22416] do_fast_syscall_32+0x27b/0xdb3 [ 327.532380][T22416] entry_SYSENTER_compat+0x70/0x7f [ 327.559852][T22416] RIP: 0023:0xf7f939c9 [ 327.563910][T22416] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 327.584190][T22416] RSP: 002b:00000000f5d8f0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000171 [ 327.592596][T22416] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000020000c00 [ 327.600553][T22416] RDX: 000000000000006f RSI: 000000000404c004 RDI: 0000000000000000 [ 327.608511][T22416] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 327.616472][T22416] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 327.624434][T22416] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 327.632418][T22433] CPU: 1 PID: 22433 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 327.640397][T22433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.650448][T22433] Call Trace: [ 327.653741][T22433] dump_stack+0x172/0x1f0 [ 327.658075][T22433] should_fail.cold+0xa/0x15 [ 327.662670][T22433] ? lock_downgrade+0x920/0x920 [ 327.667520][T22433] ? fault_create_debugfs_attr+0x180/0x180 [ 327.673318][T22433] ? page_to_nid.part.0+0x20/0x20 [ 327.673334][T22433] ? ___might_sleep+0x163/0x280 [ 327.673356][T22433] __should_failslab+0x121/0x190 [ 327.683192][T22433] should_failslab+0x9/0x14 [ 327.683204][T22433] kmem_cache_alloc+0x2aa/0x710 [ 327.683220][T22433] ? __kasan_check_read+0x11/0x20 [ 327.692616][T22433] ? do_raw_spin_unlock+0x57/0x270 [ 327.692631][T22433] key_alloc+0x426/0x1110 [ 327.692655][T22433] ? refcount_inc_not_zero_checked+0x144/0x200 [ 327.718025][T22433] ? key_user_put+0x70/0x70 [ 327.722540][T22433] ? refcount_inc_checked+0x2b/0x70 [ 327.727758][T22433] ? apparmor_cred_prepare+0x2c3/0x550 [ 327.733218][T22433] keyring_alloc+0x4d/0xc0 [ 327.737639][T22433] install_process_keyring_to_cred.part.0+0x87/0x100 [ 327.744319][T22433] lookup_user_key+0xc97/0xfb0 [ 327.749089][T22433] ? join_session_keyring+0x340/0x340 [ 327.755262][T22433] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 327.761062][T22433] ? lock_downgrade+0x920/0x920 [ 327.761077][T22433] ? key_validate+0x100/0x100 [ 327.761097][T22433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.777003][T22433] ? _copy_from_user+0x12c/0x1a0 [ 327.781951][T22433] __ia32_sys_add_key+0x277/0x4f0 [ 327.786978][T22433] ? __x64_sys_add_key+0x4f0/0x4f0 [ 327.792096][T22433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.798341][T22433] ? entry_SYSENTER_compat+0x68/0x7f [ 327.803623][T22433] ? trace_hardirqs_on+0x67/0x240 [ 327.808678][T22433] do_fast_syscall_32+0x27b/0xdb3 [ 327.813706][T22433] entry_SYSENTER_compat+0x70/0x7f [ 327.818818][T22433] RIP: 0023:0xf7f069c9 23:52:33 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 327.822881][T22433] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 327.842483][T22433] RSP: 002b:00000000f5ce10cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 327.850888][T22433] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 327.858848][T22433] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe 23:52:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:33 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 327.858854][T22433] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 327.858861][T22433] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 327.858867][T22433] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:33 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$search(0xa, r1, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x3}, r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000000)='syz', 0xffffffffffffffff}, 0x30) ptrace$peekuser(0x3, r2, 0x2) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:33 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:33 executing program 0 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x2, 0x2) 23:52:33 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 327.978339][T22452] FAULT_INJECTION: forcing a failure. [ 327.978339][T22452] name failslab, interval 1, probability 0, space 0, times 0 [ 328.068301][T22452] CPU: 0 PID: 22452 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 328.076311][T22452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.086365][T22452] Call Trace: [ 328.089660][T22452] dump_stack+0x172/0x1f0 [ 328.094002][T22452] should_fail.cold+0xa/0x15 [ 328.098692][T22452] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 328.104332][T22452] ? fault_create_debugfs_attr+0x180/0x180 [ 328.110157][T22452] ? page_to_nid.part.0+0x20/0x20 23:52:33 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb03594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 328.115183][T22452] ? ___might_sleep+0x163/0x280 [ 328.120040][T22452] __should_failslab+0x121/0x190 [ 328.125071][T22452] should_failslab+0x9/0x14 [ 328.129572][T22452] __kmalloc_track_caller+0x2dc/0x760 [ 328.134944][T22452] ? kmem_cache_alloc+0x314/0x710 [ 328.139968][T22452] ? key_alloc+0x483/0x1110 [ 328.144472][T22452] kmemdup+0x27/0x60 [ 328.148360][T22452] key_alloc+0x483/0x1110 [ 328.152948][T22452] ? refcount_inc_not_zero_checked+0x144/0x200 [ 328.159110][T22452] ? key_user_put+0x70/0x70 [ 328.163615][T22452] ? refcount_inc_checked+0x2b/0x70 23:52:33 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:33 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000000)=0x10001) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_SET_FLAGS(r1, 0x80044324, &(0x7f0000000040)=0x1) r3 = dup(r2) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default 00000000000004096\x00'/42], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r3, 0xc0286429, &(0x7f0000000300)={r4, 0x2, &(0x7f00000001c0)=[0x10001, 0x8], &(0x7f0000000200)=[0x0], 0x35, 0x7, 0xffffffff, &(0x7f0000000240)=[0x2, 0x5, 0x6, 0x6, 0xffffffff, 0x155, 0x5], &(0x7f00000002c0)=[0x0, 0x3]}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 328.168814][T22452] ? apparmor_cred_prepare+0x2c3/0x550 [ 328.174271][T22452] keyring_alloc+0x4d/0xc0 [ 328.178690][T22452] install_process_keyring_to_cred.part.0+0x87/0x100 [ 328.185362][T22452] lookup_user_key+0xc97/0xfb0 [ 328.190141][T22452] ? join_session_keyring+0x340/0x340 [ 328.190155][T22452] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 328.190171][T22452] ? lock_downgrade+0x920/0x920 [ 328.190188][T22452] ? key_validate+0x100/0x100 [ 328.210844][T22452] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 23:52:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb04594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 328.217081][T22452] ? _copy_from_user+0x12c/0x1a0 [ 328.222024][T22452] __ia32_sys_add_key+0x277/0x4f0 [ 328.227068][T22452] ? __x64_sys_add_key+0x4f0/0x4f0 [ 328.232174][T22452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.232189][T22452] ? entry_SYSENTER_compat+0x68/0x7f [ 328.232202][T22452] ? trace_hardirqs_on+0x67/0x240 [ 328.232218][T22452] do_fast_syscall_32+0x27b/0xdb3 [ 328.232234][T22452] entry_SYSENTER_compat+0x70/0x7f [ 328.258914][T22452] RIP: 0023:0xf7f069c9 [ 328.262985][T22452] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 328.282584][T22452] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 328.290992][T22452] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 328.298433][T22475] encrypted_key: master key parameter '00000000000004096' is invalid [ 328.298955][T22452] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe 23:52:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x10, 0x2) 23:52:34 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb05594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 328.298963][T22452] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 328.298971][T22452] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 328.298979][T22452] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:34 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:34 executing program 0 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 328.434268][T22475] encrypted_key: master key parameter '00000000000004096' is invalid [ 328.494848][T22497] FAULT_INJECTION: forcing a failure. [ 328.494848][T22497] name failslab, interval 1, probability 0, space 0, times 0 [ 328.521249][T22497] CPU: 1 PID: 22497 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 328.529260][T22497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.539307][T22497] Call Trace: [ 328.539329][T22497] dump_stack+0x172/0x1f0 [ 328.539353][T22497] should_fail.cold+0xa/0x15 [ 328.546951][T22497] ? fault_create_debugfs_attr+0x180/0x180 [ 328.546972][T22497] ? page_to_nid.part.0+0x20/0x20 [ 328.562337][T22497] ? ___might_sleep+0x163/0x280 [ 328.567202][T22497] __should_failslab+0x121/0x190 [ 328.572146][T22497] should_failslab+0x9/0x14 [ 328.576693][T22497] kmem_cache_alloc_trace+0x2d3/0x790 [ 328.582068][T22497] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 328.588314][T22497] assoc_array_insert+0xf4/0x2de0 [ 328.593343][T22497] ? mark_held_locks+0xf0/0xf0 [ 328.598104][T22497] ? key_instantiate_and_link+0x393/0x4b0 [ 328.598118][T22497] ? _raw_spin_unlock+0x2d/0x50 [ 328.598138][T22497] ? lock_acquire+0x190/0x410 [ 328.608660][T22497] ? __key_link_lock+0x51/0xd0 [ 328.608677][T22497] ? assoc_array_cancel_edit+0x90/0x90 [ 328.608695][T22497] ? __kasan_check_write+0x14/0x20 [ 328.628623][T22497] ? down_write+0xdf/0x150 [ 328.633031][T22497] ? __down_timeout+0x2d0/0x2d0 [ 328.637866][T22497] ? key_free_user_ns+0x1f0/0x1f0 [ 328.637879][T22497] __key_link_begin+0xf2/0x250 [ 328.637896][T22497] key_create_or_update+0x3df/0xbe0 [ 328.652849][T22497] ? key_type_lookup+0xf0/0xf0 [ 328.657611][T22497] ? join_session_keyring+0x340/0x340 [ 328.662997][T22497] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 328.669278][T22497] __ia32_sys_add_key+0x2c2/0x4f0 [ 328.674304][T22497] ? __x64_sys_add_key+0x4f0/0x4f0 [ 328.679420][T22497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.685670][T22497] ? entry_SYSENTER_compat+0x68/0x7f [ 328.690953][T22497] ? trace_hardirqs_on+0x67/0x240 [ 328.695982][T22497] do_fast_syscall_32+0x27b/0xdb3 [ 328.701007][T22497] entry_SYSENTER_compat+0x70/0x7f [ 328.704369][T22507] encrypted_key: keyword 'new' not allowed when called from .update method [ 328.706452][T22497] RIP: 0023:0xf7f069c9 [ 328.706464][T22497] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 23:52:34 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) msgget$private(0x0, 0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x4c01, 0x2) 23:52:34 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5401, 0x2) 23:52:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb09594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:34 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:34 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:34 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000440)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x4e21, @multicast2}}}, 0x90) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r4 = request_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000003c0)='encrypted\x00', 0xffffffffffffffff) keyctl$instantiate(0xc, r4, &(0x7f0000000100)=ANY=[], 0x0, 0x0) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000000)="5537b7952aa8dff2639c044d497dbab0d2002e48f3b77f9687963ae7891e75ee8e56a8499013980732338d78c2c506c7a52c6ff08418854cd1e79e43f13b79539416c5b647b0dc137afad44052b2db70d3106902aa0a6b5a28ac7eaf6d", 0x5d}, {&(0x7f00000002c0)="c8c2319173fa86ec52901757cb99b5578a5707c20f3d4e270e202b9c49d3bb4beee0bc3384e533aff9df7ca647000a8955668821282fde3ba3cfd3a5b4bb8eeeaf987abe1427577052b4e411c7d78251ad76f9c68887fe5370da7d10274ef5512d169c57978a384ea6b34309317c7175f15753bc4db5758156d5fae3376a7183a10bf17af7b82ae885486e5b7d1c993282bc7629b4430c1ecc771ca03bfde97d3d3809e1bd897ab511ec0c7bf768a61366a599a5d3f94c66f680509126aeee4b67dcc362307337bcf9b1205bcce07298f7646b092cdf02b4e0ca3be4548e47c9721e48d2a90c85882746de", 0xeb}], 0x2, 0x8) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 328.706477][T22497] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 328.747171][T22497] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 328.755134][T22497] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 328.763090][T22497] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 328.763096][T22497] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 328.763102][T22497] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:34 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb0a594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5408, 0x2) [ 328.842607][T22521] encrypted_key: insufficient parameters specified [ 328.873675][T22521] encrypted_key: insufficient parameters specified 23:52:34 executing program 0 (fault-call:2 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:34 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:34 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb11594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:34 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:34 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b2570ddadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:34 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:34 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5409, 0x2) [ 329.098795][T22547] encrypted_key: insufficient parameters specified [ 329.140748][T22553] encrypted_key: insufficient parameters specified [ 329.195352][T22552] FAULT_INJECTION: forcing a failure. [ 329.195352][T22552] name failslab, interval 1, probability 0, space 0, times 0 [ 329.232664][T22552] CPU: 1 PID: 22552 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 329.240677][T22552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.250736][T22552] Call Trace: [ 329.254044][T22552] dump_stack+0x172/0x1f0 [ 329.258390][T22552] should_fail.cold+0xa/0x15 [ 329.262993][T22552] ? fault_create_debugfs_attr+0x180/0x180 [ 329.268809][T22552] ? page_to_nid.part.0+0x20/0x20 [ 329.273843][T22552] ? ___might_sleep+0x163/0x280 [ 329.278698][T22552] __should_failslab+0x121/0x190 [ 329.283663][T22552] should_failslab+0x9/0x14 [ 329.288171][T22552] kmem_cache_alloc_trace+0x2d3/0x790 23:52:34 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:34 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:34 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) [ 329.293551][T22552] assoc_array_insert+0x79e/0x2de0 [ 329.298669][T22552] ? mark_held_locks+0xf0/0xf0 [ 329.303440][T22552] ? key_instantiate_and_link+0x393/0x4b0 [ 329.309161][T22552] ? _raw_spin_unlock+0x2d/0x50 [ 329.314017][T22552] ? lock_acquire+0x190/0x410 [ 329.318697][T22552] ? __key_link_lock+0x51/0xd0 [ 329.323468][T22552] ? assoc_array_cancel_edit+0x90/0x90 [ 329.328935][T22552] ? __kasan_check_write+0x14/0x20 [ 329.334049][T22552] ? down_write+0xdf/0x150 [ 329.338465][T22552] ? __down_timeout+0x2d0/0x2d0 [ 329.343326][T22552] ? key_free_user_ns+0x1f0/0x1f0 [ 329.348357][T22552] __key_link_begin+0xf2/0x250 [ 329.353114][T22552] key_create_or_update+0x3df/0xbe0 [ 329.358411][T22552] ? key_type_lookup+0xf0/0xf0 [ 329.363180][T22552] ? join_session_keyring+0x340/0x340 [ 329.368568][T22552] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.374811][T22552] __ia32_sys_add_key+0x2c2/0x4f0 [ 329.379829][T22552] ? __x64_sys_add_key+0x4f0/0x4f0 [ 329.379846][T22552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.379864][T22552] ? entry_SYSENTER_compat+0x68/0x7f [ 329.391191][T22552] ? trace_hardirqs_on+0x67/0x240 [ 329.391208][T22552] do_fast_syscall_32+0x27b/0xdb3 [ 329.391226][T22552] entry_SYSENTER_compat+0x70/0x7f [ 329.412514][T22552] RIP: 0023:0xf7f069c9 [ 329.416586][T22552] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 329.436188][T22552] RSP: 002b:00000000f5ce10cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 329.444598][T22552] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 329.452549][T22552] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 329.460520][T22552] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 329.468475][T22552] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 329.476426][T22552] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:35 executing program 0 (fault-call:2 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:35 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x540e, 0x2) 23:52:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc025b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:35 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="877a5132a5e36e65772064656661756c7420757365723a73797a20303030303030303030303030303030"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:35 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) [ 329.587118][T22587] encrypted_key: keyword '‡zQ2Ąănew' not recognized 23:52:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x540f, 0x2) 23:52:35 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:35 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc045b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 329.633659][T22587] encrypted_key: keyword '‡zQ2Ąănew' not recognized [ 329.654418][T22593] FAULT_INJECTION: forcing a failure. [ 329.654418][T22593] name failslab, interval 1, probability 0, space 0, times 0 23:52:35 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$MON_IOCX_GETX(r1, 0x400c920a, &(0x7f0000000440)={&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000003c0)=""/104, 0x68}) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000100)=0x3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) recvfrom$packet(r0, &(0x7f0000000000)=""/156, 0x9c, 0x40002000, &(0x7f00000001c0)={0x11, 0x0, r2, 0x1, 0x3, 0x6, @dev={[], 0xa}}, 0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000a80)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000680)={0x39c, r3, 0x620, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x124, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x104, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x104, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r2}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r2}}}]}}]}, 0x39c}, 0x1, 0x0, 0x0, 0x4008010}, 0x20004004) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc095b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 329.798169][T22593] CPU: 1 PID: 22593 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 329.806183][T22593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.816762][T22593] Call Trace: [ 329.820062][T22593] dump_stack+0x172/0x1f0 [ 329.824401][T22593] should_fail.cold+0xa/0x15 [ 329.828996][T22593] ? lock_downgrade+0x920/0x920 [ 329.833853][T22593] ? fault_create_debugfs_attr+0x180/0x180 [ 329.839665][T22593] ? page_to_nid.part.0+0x20/0x20 [ 329.844717][T22593] ? ___might_sleep+0x163/0x280 [ 329.849557][T22593] __should_failslab+0x121/0x190 [ 329.849573][T22593] should_failslab+0x9/0x14 [ 329.849583][T22593] kmem_cache_alloc+0x2aa/0x710 [ 329.849601][T22593] ? __kasan_check_read+0x11/0x20 [ 329.868848][T22593] ? do_raw_spin_unlock+0x57/0x270 [ 329.874044][T22593] key_alloc+0x426/0x1110 [ 329.878365][T22593] ? key_user_put+0x70/0x70 [ 329.878382][T22593] key_create_or_update+0x651/0xbe0 [ 329.878399][T22593] ? key_type_lookup+0xf0/0xf0 [ 329.892817][T22593] ? join_session_keyring+0x340/0x340 [ 329.898215][T22593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 329.904467][T22593] __ia32_sys_add_key+0x2c2/0x4f0 [ 329.909500][T22593] ? __x64_sys_add_key+0x4f0/0x4f0 [ 329.914713][T22593] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.920971][T22593] ? entry_SYSENTER_compat+0x68/0x7f [ 329.926312][T22593] ? trace_hardirqs_on+0x67/0x240 [ 329.931336][T22593] do_fast_syscall_32+0x27b/0xdb3 [ 329.936352][T22593] entry_SYSENTER_compat+0x70/0x7f [ 329.941643][T22593] RIP: 0023:0xf7f069c9 [ 329.945711][T22593] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 329.965489][T22593] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 329.971944][T22616] encrypted_key: insufficient parameters specified [ 329.973899][T22593] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 329.973908][T22593] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe 23:52:35 executing program 0 (fault-call:2 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:35 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:35 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5410, 0x2) 23:52:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96708476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 329.973915][T22593] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 329.973923][T22593] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 329.973940][T22593] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 329.994576][T22617] encrypted_key: insufficient parameters specified 23:52:35 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:35 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064656661756c7420757304000000797a20303030303030303030303030303030303430393600d410b3d1d9ab63c8a966e0699b904d63905dbb1b1638cdd84938a2dae856c0cd491807b5b2f55e3c0dec9d3c46a573fda368459ad3c7b18a2d48571d0a15c23fad8ed8c7708586747dac93efac3506ba0a2d85e71fd84aae35e35be008c03a3e8473522ccceb27d7eccf77c9f3dac401813661e24858292b3afdfa7511f7a08ea16db813753ebaff43c6a1601014"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:35 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5412, 0x2) [ 330.164802][T22631] FAULT_INJECTION: forcing a failure. [ 330.164802][T22631] name failslab, interval 1, probability 0, space 0, times 0 [ 330.216322][T22640] encrypted_key: insufficient parameters specified [ 330.228092][T22631] CPU: 0 PID: 22631 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 330.236096][T22631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.246323][T22631] Call Trace: [ 330.249622][T22631] dump_stack+0x172/0x1f0 [ 330.253971][T22631] should_fail.cold+0xa/0x15 [ 330.258574][T22631] ? fault_create_debugfs_attr+0x180/0x180 [ 330.260039][T22640] encrypted_key: insufficient parameters specified [ 330.264397][T22631] __should_failslab+0x121/0x190 [ 330.264415][T22631] should_failslab+0x9/0x14 [ 330.264429][T22631] __kmalloc_track_caller+0x2dc/0x760 [ 330.264449][T22631] ? kmem_cache_alloc+0x314/0x710 [ 330.290732][T22631] ? key_alloc+0x483/0x1110 [ 330.295322][T22631] kmemdup+0x27/0x60 [ 330.299215][T22631] key_alloc+0x483/0x1110 [ 330.303554][T22631] ? key_user_put+0x70/0x70 [ 330.308058][T22631] key_create_or_update+0x651/0xbe0 [ 330.313255][T22631] ? key_type_lookup+0xf0/0xf0 [ 330.318019][T22631] ? join_session_keyring+0x340/0x340 [ 330.323412][T22631] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 330.329654][T22631] __ia32_sys_add_key+0x2c2/0x4f0 [ 330.334768][T22631] ? __x64_sys_add_key+0x4f0/0x4f0 [ 330.339887][T22631] ? kernel_fpu_begin+0x2f0/0x2f0 [ 330.344919][T22631] ? entry_SYSENTER_compat+0x68/0x7f [ 330.350190][T22631] ? trace_hardirqs_on+0x67/0x240 [ 330.350207][T22631] do_fast_syscall_32+0x27b/0xdb3 [ 330.350222][T22631] entry_SYSENTER_compat+0x70/0x7f 23:52:35 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba094b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:35 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:35 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) [ 330.350232][T22631] RIP: 0023:0xf7f069c9 [ 330.350247][T22631] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 330.350253][T22631] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 330.389042][T22631] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 330.389050][T22631] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe 23:52:36 executing program 0 (fault-call:2 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:36 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) add_key(&(0x7f00000001c0)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000000), 0x0, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x541a, 0x2) 23:52:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4d0d15237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:36 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:36 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 330.389057][T22631] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 330.389063][T22631] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 330.389070][T22631] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 330.501887][T22662] FAULT_INJECTION: forcing a failure. [ 330.501887][T22662] name failslab, interval 1, probability 0, space 0, times 0 [ 330.517230][T22662] CPU: 1 PID: 22662 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 330.525218][T22662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.535470][T22662] Call Trace: [ 330.538761][T22662] dump_stack+0x172/0x1f0 [ 330.543100][T22662] should_fail.cold+0xa/0x15 23:52:36 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0xfffffffffffffdfc) 23:52:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d908af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 330.547692][T22662] ? fault_create_debugfs_attr+0x180/0x180 [ 330.553500][T22662] ? page_to_nid.part.0+0x20/0x20 [ 330.558525][T22662] ? ___might_sleep+0x163/0x280 [ 330.563386][T22662] __should_failslab+0x121/0x190 [ 330.568332][T22662] should_failslab+0x9/0x14 [ 330.572832][T22662] __kmalloc+0x2e0/0x770 [ 330.577074][T22662] ? lock_acquire+0x190/0x410 [ 330.581749][T22662] ? __key_instantiate_and_link+0x3c/0x3e0 [ 330.587586][T22662] ? encrypted_instantiate+0x157/0x947 [ 330.593052][T22662] encrypted_instantiate+0x157/0x947 23:52:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace090589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 330.598332][T22662] ? __mutex_lock+0x45d/0x13c0 [ 330.598354][T22662] ? datablob_hmac_verify+0x310/0x310 [ 330.608449][T22662] ? key_alloc+0x901/0x1110 [ 330.612969][T22662] ? mutex_lock_io_nested+0x1260/0x1260 [ 330.618517][T22662] ? _raw_spin_unlock+0x2d/0x50 [ 330.623359][T22662] ? key_alloc+0xaa6/0x1110 [ 330.627859][T22662] __key_instantiate_and_link+0xd2/0x3e0 [ 330.627876][T22662] key_create_or_update+0x68e/0xbe0 [ 330.638676][T22662] ? key_type_lookup+0xf0/0xf0 [ 330.643438][T22662] ? join_session_keyring+0x340/0x340 [ 330.648825][T22662] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 330.655075][T22662] __ia32_sys_add_key+0x2c2/0x4f0 [ 330.655093][T22662] ? __x64_sys_add_key+0x4f0/0x4f0 [ 330.665187][T22662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.665199][T22662] ? entry_SYSENTER_compat+0x68/0x7f [ 330.665215][T22662] ? trace_hardirqs_on+0x67/0x240 [ 330.676790][T22662] do_fast_syscall_32+0x27b/0xdb3 [ 330.676809][T22662] entry_SYSENTER_compat+0x70/0x7f [ 330.686803][T22662] RIP: 0023:0xf7f069c9 [ 330.686817][T22662] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 330.686829][T22662] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 330.695973][T22662] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 330.695981][T22662] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 330.695988][T22662] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 23:52:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x541b, 0x2) 23:52:36 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:36 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 330.696001][T22662] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 330.723966][T22662] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:36 executing program 0 (fault-call:2 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x541d, 0x2) 23:52:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070289041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:36 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) write$P9_RREADDIR(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="e400000029010007000000200400000007000000000000007fffffffffffffff0907002e2f66696c65300801000000040000000000000000040000000000000507002e2f66696c653001000000000300000000000000500c000000000000b407002e2f66696c65300203000000080000000000000009000000000000000007002e2f66696c65300404000000060000000000000003000000000000000007002e2f66696c65301000000000010000000000000001000080000000000407002e2f66696c6530200400000007000000000000002d0f0000000000000007002e2f66696c6530dd821d6cc83fa52c88b59824836b0089cd1b8574def04eeea9bc0f70591e12198c6c6740e180a0c06dc0c21ba311c1f48690d1ff4f1dca74c7fba3fc8e96d7d2"], 0xe4) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000000)) connect$inet(r0, 0x0, 0x1a7) 23:52:36 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:36 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:36 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) [ 330.994493][T22697] FAULT_INJECTION: forcing a failure. [ 330.994493][T22697] name failslab, interval 1, probability 0, space 0, times 0 [ 330.999762][T22701] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:36 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070789041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 331.122272][T22697] CPU: 0 PID: 22697 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #80 [ 331.130316][T22697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.140465][T22697] Call Trace: [ 331.143769][T22697] dump_stack+0x172/0x1f0 [ 331.148116][T22697] should_fail.cold+0xa/0x15 [ 331.152723][T22697] ? fault_create_debugfs_attr+0x180/0x180 [ 331.158601][T22697] ? page_to_nid.part.0+0x20/0x20 [ 331.163631][T22697] ? ___might_sleep+0x163/0x280 [ 331.168487][T22697] __should_failslab+0x121/0x190 [ 331.173435][T22697] should_failslab+0x9/0x14 [ 331.177939][T22697] __kmalloc+0x2e0/0x770 [ 331.182182][T22697] ? _raw_spin_unlock+0x2d/0x50 [ 331.187032][T22697] ? key_payload_reserve+0xa8/0x440 [ 331.192235][T22697] ? encrypted_key_alloc+0x218/0x430 [ 331.197518][T22697] encrypted_key_alloc+0x218/0x430 [ 331.202649][T22697] ? init_skcipher_req.constprop.0+0x1d0/0x1d0 [ 331.202666][T22697] encrypted_instantiate+0x22e/0x947 [ 331.202681][T22697] ? __mutex_lock+0x45d/0x13c0 23:52:36 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0x8000}, 0x2) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:36 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x541e, 0x2) 23:52:36 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) [ 331.202700][T22697] ? datablob_hmac_verify+0x310/0x310 [ 331.224318][T22697] ? mutex_lock_io_nested+0x1260/0x1260 [ 331.229872][T22697] ? _raw_spin_unlock+0x2d/0x50 [ 331.234726][T22697] ? key_alloc+0xaa6/0x1110 [ 331.239238][T22697] __key_instantiate_and_link+0xd2/0x3e0 [ 331.244872][T22697] key_create_or_update+0x68e/0xbe0 [ 331.250069][T22697] ? key_type_lookup+0xf0/0xf0 [ 331.254847][T22697] ? join_session_keyring+0x340/0x340 [ 331.260240][T22697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 331.266496][T22697] __ia32_sys_add_key+0x2c2/0x4f0 [ 331.271523][T22697] ? __x64_sys_add_key+0x4f0/0x4f0 [ 331.276633][T22697] ? entry_SYSENTER_compat+0x68/0x7f [ 331.281921][T22697] ? trace_hardirqs_on+0x67/0x240 [ 331.286948][T22697] do_fast_syscall_32+0x27b/0xdb3 [ 331.286964][T22697] entry_SYSENTER_compat+0x70/0x7f [ 331.286979][T22697] RIP: 0023:0xf7f069c9 [ 331.301125][T22697] Code: d3 83 c4 10 5b 5e 5d c3 ba 80 96 98 00 eb a9 8b 04 24 c3 8b 34 24 c3 8b 3c 24 c3 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 331.320721][T22697] RSP: 002b:00000000f5d020cc EFLAGS: 00000296 ORIG_RAX: 000000000000011e [ 331.320736][T22697] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000020000180 [ 331.320744][T22697] RDX: 0000000020000100 RSI: 00000000000000ca RDI: 00000000fffffffe [ 331.320751][T22697] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 331.320757][T22697] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 331.320764][T22697] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 23:52:37 executing program 0 (fault-call:2 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070889041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x541f, 0x2) 23:52:37 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:37 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:37 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000000)) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:37 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:37 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070989041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5420, 0x2) 23:52:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:37 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 000000000004096\x00'], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:37 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5421, 0x2) 23:52:37 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='.ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:37 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070a89041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:37 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) ioctl$TIOCNXCL(r1, 0x540d) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:37 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5422, 0x2) 23:52:37 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypt.d\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070b89041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:37 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:37 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5423, 0x2) 23:52:37 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303030303030303030303030303030303430393600e7faca6832bc896d6737fb08e16dbac61ebad502c11c1f4a84bee35544902a99b0b384d50f4271da8e53bab5807ce8fdf7373e97a20c4b28a962a5d191df20394f"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$CAPI_INSTALLED(r0, 0x80024322) 23:52:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589021806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x02', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:37 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:37 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5424, 0x2) [ 332.245559][T22836] encrypted_key: insufficient parameters specified 23:52:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589031806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:38 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) [ 332.358211][T22855] encrypted_key: insufficient parameters specified 23:52:38 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x03', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589091806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:38 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a203030303030303030303030303030303034303936008a"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$instantiate(0xc, r1, 0x0, 0xfffffff4, r1) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:38 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5425, 0x2) 23:52:38 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\t', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:38 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:38 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000240)={0x2, 0x0, &(0x7f0000000000)=""/231, &(0x7f00000001c0)=""/107, &(0x7f00000002c0)=""/86, 0xd000}) 23:52:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041803619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:38 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:38 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5427, 0x2) 23:52:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\n', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:38 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041809619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:38 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000000)=0x2000, 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) dup(r1) r3 = getpid() ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000080)={r1, r1, 0x1}) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5428, 0x2) 23:52:38 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:38 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041811619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:38 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:38 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) [ 333.101334][T22927] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5429, 0x2) 23:52:38 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) connect$inet(r0, 0x0, 0x0) 23:52:38 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:38 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:38 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041821619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x542e, 0x2) 23:52:39 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key(&(0x7f0000000040)='logon\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="d5813b60df6f30602370d0431e446a93d18236", 0x13, 0x0) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$instantiate(0xc, r1, &(0x7f00000001c0)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'ppp1eth1}%vmnet1ppp0', 0x20, 0x81}, 0x3e, r2) keyctl$instantiate(0xc, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xfffffffffffffc48, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x29, 0x100) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r2, r3, r4) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000640)=0x0) ioprio_get$pid(0x3, r5) 23:52:39 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:39 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace07058904182f619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x542f, 0x2) 23:52:39 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 333.551469][T22983] encrypted_key: insufficient parameters specified 23:52:39 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace07058904183a619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 333.638580][T23000] encrypted_key: insufficient parameters specified 23:52:39 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303030b20000000000000030303030303430393600"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) clock_nanosleep(0x6, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:39 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:39 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5432, 0x2) 23:52:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:39 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d8ae451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:39 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:39 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000021}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1a670000", @ANYRES16=r2, @ANYBLOB="fb382bbd7000fddbdf250600000008000400faffffff3c00020008000800010100000800050004000000080002004e2000000800070000000000080002004e230000080002004e210000080002004e2200001c00020008000300000000000800040000000080080005003a0000001400010008000b0073697000080009000b000000080006000000000014000200080004002000000008000d0001000000140001000800060073656400080002005e000000080006000600000008000600000400000800060009000000"], 0xd0}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:39 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:39 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03dade451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5435, 0x2) 23:52:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\xff', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:39 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:39 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab02cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:39 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a2030303030303030303b303030303030303430393600c4b607cb78f8a8bdcf8581e8c98e43c4b95059293d9c02515c45251acfe267d9291ae4c52b60853c00"/95], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5437, 0x2) 23:52:39 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:39 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab03cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 334.320032][T23077] encrypted_key: insufficient parameters specified 23:52:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5441, 0x2) [ 334.383383][T23087] encrypted_key: insufficient parameters specified 23:52:40 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000040)={0x10000, 0x1319}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x1000, 0x4) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:40 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:40 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:40 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab04cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5450, 0x2) 23:52:40 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e65772064656661756c7420807365723a73797a203030dd00000030d565736777b7a33030303030303030303430393600"], 0xfffffffffffffc48, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x4) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:40 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:40 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 334.783445][T23130] encrypted_key: insufficient parameters specified 23:52:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab05cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:40 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:40 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) write$UHID_INPUT2(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0c0000004d00ddc5f5b4b608471b431b18511ee81323d3248c28346da931c8086d049cbfb64c24ffedcdc908eee98707c055e1194e2d1bde4e047b4fde0ae645d4e32d1919d8e1f93ba8"], 0x53) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5452, 0x2) [ 334.825394][T23130] encrypted_key: insufficient parameters specified 23:52:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:40 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:40 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5453, 0x2) 23:52:40 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab06cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5456, 0x2) 23:52:40 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:40 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:40 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab07cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 335.213178][T23178] encrypted_key: insufficient parameters specified 23:52:40 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) [ 335.298415][T23189] encrypted_key: insufficient parameters specified 23:52:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5457, 0x2) 23:52:41 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="9450a143fa6845db756c7420757365723a73797a20303030303030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab08cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:41 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:41 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) [ 335.478929][T23211] encrypted_key: keyword '”PˇCúhEŰult' not recognized 23:52:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5459, 0x2) 23:52:41 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab09cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 335.571645][T23223] encrypted_key: keyword '”PˇCúhEŰult' not recognized 23:52:41 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) poll(&(0x7f0000000000)=[{r0, 0x20}, {r1, 0x100}, {r1, 0x1004}, {r0, 0x4}, {r1, 0x8a}, {r0, 0x1}, {r0, 0x8000}], 0x7, 0x7ff) 23:52:41 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x545c, 0x2) 23:52:41 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab0acbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:41 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x545d, 0x2) 23:52:41 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:41 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$getown(r1, 0x9) syz_open_procfs(r2, &(0x7f0000000080)='net/ip_mr_vif\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e657720e4656661756c742075736572cb60d4acd74f57717bffffff30303030303030307713184c7eec6fad303430b93600fc699e8cc93616b02d4846a3577ae2cbe3c8190b7384233a00008af5f1"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:41 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:41 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab0bcbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 336.005798][T23274] encrypted_key: insufficient parameters specified [ 336.071776][T23282] encrypted_key: insufficient parameters specified 23:52:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x5460, 0x2) 23:52:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:41 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:41 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000003380)={0x8, "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", 0x132b}, 0x1006) keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e65773c64656661756c7420757365723a73797a2030303430303030303030303030682f0c303030343ca1619dc9429e884e66426e46303936"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:41 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:41 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab0ccbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:41 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:41 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 336.307638][T23310] encrypted_key: insufficient parameters specified 23:52:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x6364, 0x2) 23:52:42 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab0dcbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 336.357666][T23310] encrypted_key: insufficient parameters specified 23:52:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:42 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:42 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f00000002c0)="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", 0xfc, 0xfffffffffffffffa) r3 = request_key(&(0x7f00000001c0)='trusted\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='new ', 0xfffffffffffffffe) keyctl$instantiate(0xc, r3, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x29, r2) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={&(0x7f0000000440)={0xe4, r4, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x1}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2b, 0x2}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10000}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xb77}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000040}, 0x40010) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:42 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x8933, 0x2) 23:52:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab0ecbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:42 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 336.655187][T23343] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:42 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x40045431, 0x2) 23:52:42 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:42 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab0fcbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:42 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x40045436, 0x2) 23:52:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:42 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:42 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f00000002c0)=0x1020) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000000)=0x2) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000300)=@generic={0x2, 0x40, 0x7}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_update={'update ', 'default', 0x20, 'user:', 'security'}, 0x1d, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000040)=0x81) ioctl$TIOCGISO7816(r1, 0x80285442, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x4e23, @empty}, {0x306, @broadcast}, 0x48, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'syzkaller1\x00'}) syz_open_dev$ndb(&(0x7f0000000340)='/dev/nbd#\x00', 0x0, 0x14000) add_key(&(0x7f0000000140)='r+-pc\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffe) r3 = semget(0x1, 0x1, 0x200) semctl$IPC_INFO(r3, 0x4, 0x3, &(0x7f00000001c0)=""/93) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000380)={0x0, 0xdd, 0x5, 0xe59, 0x1}, &(0x7f00000003c0)=0x14) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000400)={r4}, 0x8) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000240)=0x8, 0x4) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) 23:52:42 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab10cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400454ca, 0x2) 23:52:42 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:42 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab11cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:42 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:42 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000040)={0x5, {{0xa, 0x4e23, 0x1699, @mcast1, 0x7f}}}, 0x84) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'.yz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:42 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x2) 23:52:42 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:43 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab12cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x4004743b, 0x2) 23:52:43 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:43 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x4000) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000001c0)={'veth1_to_team\x00', @random="2e6cb6c07da2"}) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) keyctl$instantiate(0xc, 0x0, &(0x7f0000002540)=ANY=[@ANYBLOB="6e657720b7dfa8959129899b757365723a73797a040000000000000030ff7f00003030303034303936001f20525fee5edd9709a6b47b722ad638352b15d103898cc42bee2ab9113f0000000000000000ffee361cd2edd9251faf4fa2f3245cf25965a2d3ea87651b0f3b4f107571a35596af3089c188c9363c608edc492afe009f3a8bfd3ae55f4a3dc05dd259f7264949776b87fbe1e6c4107d0019c3580b5e74898ef9d7ed977c0897d39aac8c6685ff151bc0"], 0xfffffffffffffc48, 0x0) sendmsg$alg(r0, &(0x7f0000002500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)="5f0b3bed5c071621152ab61eeee0ef593a32d428cbcdc8b2e5b40ab6ad61ed2dc2d6fb9835f12c63ba7d5e0e18e2a3ce9f650c57600a7e3902525bf7295ae143f5011554d3fa2ce48e608c57be02c9fd8a2f355693c9ecf7408176cd9ed6cf271a714ace0e36a22cb178234af734e19b4d01bba213f967bb8565efe47da4afc879dddb1ab9f4f3ca5d1ddd48a2a37d5ebd18ab5e64500cf6c471c98426b6a3311b9af66a2f1401237f3a74b19c7a144f4dbc190b1f3bddc3e6cf3900e51574729afe9e3e2df6c639", 0xc8}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="69cf755ffe576c281034d96d982c1da23888aa9e9a6bc800a1b0844a607d41d2792a97f8c5b329f105e0db9c67c1739afd278b0657cd4e09f0d83590b3097f6721cb9527902babe00103e6bec441a95e176e865e8e0adde51a29d51e02775eca263a9566243849d97cc9633f531adfed08b6a0e6ab3205896ddb11cce295c3cafae853928c6a8ca59403fa8b9cda51e069ae47621078a92a88c38a21fc49b2e12bc189a7990496667f29cf7b4714ba31dc100c75b3cffb8443a5d31ced2aaf49b5dd8c11fcb085f131d1bd7cad9536bab74402ab707aa896eb7258a5515450c742a328b83252191c0cb99101c0ee4812b0a74187f3aa05b72c9d74bac253a7e78c598287b3e1512f73fce4f6c1cf18ba286251bf7287b7c1ec6c845a33912f5160bb3fe93a8fe9ffb45a95713961e9038799a8adfa448bcef456a872d04e6b26ccdca56ab9596f940ecde584bdb2167ce2f086bcafca777b85764a5f6fd29167b4a4fbe82bb071eea522174aef5003ae6cf056f26afd3e7330f4196f3d604122c8a27e534eb5c757f46e2f3010e41c76df2b6c44d5635b6c4ca48e42cd3cd77b53bd92dc900a1538906081bc60ad607d36356efcd240959272c9a5a88a45ab203dc9bee0a8863991b42b83a4aec520a0fb410e28a5e51f4b7478ff758699ad3882c63f580e3879e2709c4e65a915f59668a4cae36a28ea28a99f15fde9069edcd45698707f5e8d863d110baace12659d14e5e2711bcc1cfeefd1bc1e4e9f29518f25a4a34397817b4d1f08b5d52c2ee57da7420e116d343ded011cf9d9128497617f3ed48b1b9065cd9db95c700ba493d772b0142be6e9425cd019a19831cd804b585084141bf287af5ee4e38c8d74caef5e429554f3b1139e2a6c78c830237cd803e91ba594ee44540b918030b0fa3f4a53a8d5209dbeb7302affe33a8f4c3e417452fc7080445c6f32635384779beee9d91b21e76eef2f61657e8434bf7786b8cc9c93341c19125cd609f8c36933b3d7ddb06a13ad10a76cc5f8653a71901a894ed49a93318ab34e6f039b50d77917e7c92850d1b86202a5fbbd4aaf5bf62157f24b63e7018f6952791b5d12a3387bece1cb4b407be3d12b112df8d57d5c1b7aa0f6de21a0bd4dcfac4e69b48459e09691d0151eeb2d6deea6c45a0926f37189a55f74602a8a41f77f02dce82225343ea206317f90d3bc0241587bb018f330ed5af964f57c155d3e41c6db71b0ebf5e39d17c30bcbdddff333b91874bbded4852f477d253ef2666e349ba5d9b133aa1680b1e3603163e39afc7e61cf9cd6c71bf0be622f9032cd8415afbc95500c2e2fc73102c6e7fbc9d3ba92d22616df4f92e5c246d1585c955179b06ed5386de3770ebf0690728f490675454658048cfc565530ff1fda0505159cf6084a57e87046f593a9feee9ed758ddb1d1d82752ccd47aa6b95be6f0f36227b81ef80fd82d56c5ee1da37d940133f721a5a3bdc47545aac273d27a0c97fdaeb5dcbef51d585d89c89cc340eb32c5cf21d40262bddba7d6eadf4d97cd9e093c0c6e6fffbc5c165389ca9c4b5233e00d7cece387fefa8ad613858f0c1610cd0eec268e15b50716cfcb1530127b042ffa5f157a9a027a1b87405a5a8d462bfefbe98f44a3a15b7bc73d58ea597ce0678a2e75b85d48952954553cfff09630815459ee6c7430ae39cc04e94819d28f9d9eb748ee62d15786804b451eb96eab28b89e1e5f9ae0cfaed57b173a836cfbbfbdf1799ef8b546e76029659b7fb7e35597f676f65344d64fff2b519cde92352f157f3098969529e599f10329424b0e0abc31364874163ca6f09b8d274b155259e1aceddd709690f9f2582239bd90f0d73cefe40fd6719c52f515d621e221795df614ef4e4f10a6a731235ccd4df43aa1c96a72ac7c79a5a5d026bb97af997399c686bbc96520134e62b771cb2cb5a4acfc6a8e901b02eadc5622530173de4222fb07c1a3eb3030a70cadecb5ee5f4bb07e641499d47b980cec9c5e4587fa35d2c356f3b538152a01db3b9e83749a73606a671697dd9287373085d4ccd3ac9972dad0090760a51d083330fa665e7611d0647a28f8da58b4f59d435710fb9862dee2d113da3e6f65fef552a0552de9da2f5b63cb2bd2a3cbc699448a96fe6352e0d3f9c512cd1a5fc60e615ae1cfab174adfd21581a5c4c4f0169bb8eb250b1ec99c8e574c27c3a92168366de684e066cb0a4f81254b540d9fb9f9e995c90696651d8248e99bd2c7f283f435b126e7371554ff5e4636bf579c3ada214b6b244d18539b439aff484e1f4b8981a188a3fc9a51e57fcba29277d93d805bee5f2de89ccea20d4c549147959ec9f4cd0d0adbf0d7d7c5b7c1438eb970a9712da120251ad253677657b0236ef7cbeaf613260371de31c5f371952c7e8aa5d8ead6a87b80dc574b9e96d71d5e4bb515e1e3e47aa75e005f1fbc67bbecd349600ce162a60b3079f5c3fa54743c35f89ee45726965ec87116b67b99ea2d3c4e3dfad10d51655dd11b287367cd1f1cd5447a2d2ee4a639c2663a437b542ccbf7aa73b45e49b60227c07853fc4b443c5cb97159d034d767bbeef12cf6717e9d7f71f0527fa024bd83ed7ada913b6ec91e94694cad5c2e5c94789b2d7122c71dd49113435b174c958497f5db5fa4f08d3e0464967a2f094989e3b7b03cee3ebad8b1ccb6dafcdd473ec2ef61338c6a325fb9187f5005248bb2b1e4bdf0e33daa74ead7ef8767d104c62515c868eabfddcd76bf21dcc2ef8445ffe3f0fc56f395b2639a9086bfcaf89afa2b1385e38e35fb70049f7b5578eb6be767a080b473809eb688bf250676ae20a44a50ed0fc89ac0ff4f6c2c1324704413c93e936161d9943e26df8cf85ab4bb274ecca69bc568dad1b295456ebccd7469f9bbfb9ffda5f0a21727c6a0be7743c9c6df6083885cc65d08eac52fae302a209ad008f1e888946cb509bbaf16a87a952d6192f467d13dd59eda2daefc8788aebf1da658d5b353b593cc9f8e2f2822a746b68d38302878b661bf5aa6f71eaa063cbaa050bb8b46292a6fb543cb98a0d60b7a595e577528be35ad1da6062cc8640e436fd245641bf5831f15b623a7d39c4cb685e26732df2611be269dbbd0630d5cd51f04259aff18e2e46ef4168bc8dfff2c3e1ca17d1754eb3d8c2111af77659dbd8b5e210e90ead0328717231af9b83bf8e816523d756cc4939b16dd4d74d7668edea680710ceea0709247e677d8bb6b7a6202582dc38a514ce2fdd78b79ae99e3f825266b41c4a85b10c64b13191200d1d859eab3bad286fca16dffbfd662862e9a4d57d1bdd23f6b90d15f2825ee1bef454427e12779c4dca0197788be3111c74cbf31b50e38a7ac2c930ccea3b12227eac674aaf7cde2c1b146c7f28e5ceac10bba0428d2eb6bc00911a81edf225a3905e58d1745b782faa48caa8687920201ecd8fbd6e61911b44e41638a1a433e9f7fde9b64f88541317b4412b7206fcabed84c003cc4f3696cd67333406858e9bb7a1092639f63ae5c13783da06e7f903b1b7dd67a2ee40bc63969684f7267c7d04af59080c8a9692038aca3d6cbdd762cdc25c1c7284c5c4cfa6c1aa4738aa0ce789d844de8cb0f7c3281cc2c77bbab67d055970a905d1ad70bacf67286a4c21ec7865a21db456423b088b1b6fa80b280854bda886a4391ab02171c1f6421b2743d63e718d10d3e6c7fb542a43cef2cae50a61dbb1f4d5850d5face33af0cfdb86211270b87c1cdec1ae86080389c6c1dc6e86b654d0ff5a8626fbd0bbc543b4a459417ca86dbd630efb741d23f79f3622bed6e2184fac13eaaba34241cb4f394f654a939ab84f33f634bc9ec38da61e5f75491ef198b51e1bfab6d345e662658f7097578f325b3c412cd92dd47a512890c359bd88cc9d3649fde10dd7679f9e99972f2ff396491286c409631b380aa36a39059ac764bc87fd65b5477721893fb0f4458a1ed390b82e9b63d7eb1d05fbfd29d388366caaf7e70490c940b76e8ea8371d2af5f7c9aa7f91c5c6dd723624e7ce894eb0cac78eb3ad3a3aa6f36799b97d8894ff52ed62dc2e06591f6caaf901abed5f406717dd0b3652d1a5fa7698fb0a8d3e04670993b4eac8647e249f0f5dd887d69d02f1cddb265fc7992386d4477b09b2637d40b9616612f946d4382d6979c66d49cc54667024edf67c15a6939a753ce959a48d662582242f3562e7b3f54270ab871533020d26f1a6c9e5b014cab6cff89bdfc4d0327879efb9048273112fb3147645ee5bcd5bbec7100a1df176f994de1900fc477f04a659770787be6c29449d9184b19e06ad0cab075f21f2a143ff45231b87d44c4e91374e63cd66c480f801c9457a5e1f61cf7a6d79a8bd9cf6401d7e61427c2f6aee97b139bb104675aec01936a43d410616cced49ff4ad430d695d9476cdb198dea96e87e56256c1589fb19c517bd19add84d91b9798282e9f0cbdbf16eeb0527f92a4d60a0f39e448b3643d6147a5e7441f0ceca467b87c38aa59af3453cc66641bf6fa45b9f3905139056ac9800eae338093b51fb7c03a7fb437e2db32c51c44f21b57ee09b9dfc50fede2f399ac5d2655f20053e6de517c33917a3e3f4a0832f052080a79c73417d14d98b2a5b072e5925a50cc936cc629c5b7233a8fd474178e2bebf4030a05ddbad1db524e6e31256e824c630d723a6bcef55e0c8a7c2c34bd038ad6d8177fa62e0ede83993cef311d71da0c95ce75bd877341481cb8af88fa3f4bea24980f6b3c8da0ba78c6a1078b5ff50d854b765a5a25652593b014a693204f7fd5973d9db9dfa85df6a30dec551c871ae1719a19f98deaa8d46488d75b36a97b576ac5662272876f955ff95f139d1bbef492abb7f812e1d80841c244b2f6304ff2e4a01123b70527208ea0090e8b2d74e050cb19a12f3440f642ee14c5775d64afd27f0f73bba95face62b4a5e51c3c07dba62b3a5555e7c2ee759e36e373bf049c467cee503c1961cf2af04ac828b764ff078cf3e0821a449bb12a279ff9dd3a32b092cfe627c69a29123537f4f86542daa5ed473551ab2b4a6907418c5b0c7a3619944243f488f2c5cec46a05b5e8c2283837e2feb0a2c86c0c38e2daeba023ea7c9a605ecd12704f2749bfafbe02a0293315c4dcc9d65316910079ffcd870f347e0c03472707e05fe81de5708136eaaead631f0ea9725a1ba8c20603b595e8629811b358ee5908aca81807e32d1355527cec63e0987af328c0de3db2739ccc25ced98b98b7d25ac19a22f13869625fc36f10a6eb82dd2d9b96c4a78957090cba2a96aca3e80af12911f73eee00ff58cde718bcc33d29810ff65bdef345cd2fa61031518e3b7a621162c78f05adca2a8c6fc1127943814638256cbfba7c84469df42b2d4a8d2a1b3f7ef93352e1f5594ddaabe64e03eaf2fbfd6166fd63d8f0e0d6f6dc25549b35f11cde666181897a6f4ddccd69f7e88da358fdc98a966d854579b54ccc89dafdcf9a556e87d7b4d6e05d08f5d282660fc780902c6e6efe4350771ec2e281febd3638e7f8aeb5fe6e32eb3aeb6927ffafb31323ee2e2dfeb862991053fce6d306291ecaa923b48ee2cfce7088e77d6014939537bbfc91cf5cd64930b54dfc3ff75d4939943d034be1739b748bd1fb010d5c0c0364f62066bbd39d4aae917152376e6a5c166ffb0510265bba3f8b5e755149a697aaa985c6660524493fd54a267f70a5f795b0af35165a619fb28fabcc0e7e35ade6f21aacf8749d71fc92dbc59a3048c6557281ca99534f9e4", 0x1000}, {&(0x7f00000023c0)="c9e3a20cb40a9292cf2713ec1e790d40eb955a0935683397ba4970c115c321d1779bb8f53c1ea109625b0dc3c3d098359a7a8a393c5f2320b5c9cc26da5ded6de66bee9b1e5686501e787831cef2da92c9f21fcc89514d3a1d8e93dce44249dbd39263d7a7443ab302487c73d8edff21ab57e778d39a416e016f09a8c0f14afbf4f1261f19584d3d8795f6a2ecf5609fdbf3bdd54e779ff41f89ffc1e0d8f144f46986db33951b412806f8faebba2e9eb60f569f173e63d0b056936bc495813db6de030606fcc05e377b8380f132dd467120951ae7ad7bceb18d2f19829d8403d4f305ed3aa194d7b6", 0xe9}, {&(0x7f0000000200)="d386a61f68da89126d650546a606785345d7f7ff95120f4e04fbc7b8e74b3f9fc42261b8fb5a0215fa951a881fad989eb9524ba551eafb18f86ac405921c", 0x3e}], 0x5, &(0x7f00000024c0)=[@op={0x10}], 0x10, 0x4}, 0x80) ioctl$TIOCGISO7816(r1, 0x80285442, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) dup3(r2, r0, 0x80000) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:43 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:43 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab13cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x40049409, 0x2) 23:52:43 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x9}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:43 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) [ 337.705271][T23466] encrypted_key: insufficient parameters specified 23:52:43 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab14cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 337.825544][T23484] encrypted_key: insufficient parameters specified 23:52:43 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='ne004096\x00'], 0xfffffffffffffc48, 0x0) r2 = getegid() setgid(r2) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000000), 0x4) ioctl$KDSETMODE(r1, 0x4b3a, 0x7ff) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSBRK(r0, 0x5427) 23:52:43 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x4020940d, 0x2) 23:52:43 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:43 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:43 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x300}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab15cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 338.056169][T23515] encrypted_key: insufficient parameters specified 23:52:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x402c5342, 0x2) 23:52:43 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:43 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) [ 338.153760][T23527] encrypted_key: insufficient parameters specified 23:52:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x900}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:43 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:43 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000001c0)={0x0, 0xc0, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x7ff, @loopback, 0x3}, @in={0x2, 0x4e22, @rand_addr=0x7}, @in6={0xa, 0x4e21, 0x6, @dev={0xfe, 0x80, [], 0x21}, 0x8001}, @in6={0xa, 0x4e24, 0x5, @mcast2, 0x9}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x24}}, @in6={0xa, 0x4e20, 0xffffffffffffffff, @remote, 0x100000001}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e21, @local}]}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000240)={r1, 0x100000000}, &(0x7f00000002c0)=0x8) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r2, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000380)=0x8, 0x4) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000300)={0x6, 0x8000, 0x5, 0x80, 0x7, 0x8000, 0x7, 0x6, 0x101, 0x5, 0x4, 0x9}) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:43 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab16cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:43 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x402c542b, 0x2) 23:52:44 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:44 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:52:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab17cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:44 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:44 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303cf0303030303030303030303030973430393600"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) r2 = request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000001c0)='\xc1*self$#\x00', 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xfffffffffffffdde, r2) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000200)={0x3, 0x1, [0xfad, 0xffffffff, 0x1, 0x0, 0x10000, 0xfffffffffffffffb, 0x3, 0x2]}) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=""/201, 0xc9) accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x800) 23:52:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x402c542d, 0x2) 23:52:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab18cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:44 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:44 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:44 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:44 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xcb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new Sefault user:syz 00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) gettid() 23:52:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x402c5828, 0x2) 23:52:44 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:44 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab19cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 338.911890][T23620] encrypted_key: master key parameter 'Sefault' is invalid 23:52:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x402c582a, 0x2) 23:52:44 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:44 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) [ 338.973007][T23620] encrypted_key: master key parameter 'Sefault' is invalid 23:52:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfeffff}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:44 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f00000000c0)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000001c0)="b08aaee79c508ea78dc679e0c49bbb2df077e9fd6ebd5586dfe4cc0a89ad061b9ae6d9dd6f7ed4e564d93fced5bde38d6ec5d77a0af8d4c38180ff7b90cddee8eb729926826426bccf128b6b2d4d2968a0", 0x51, 0xfffffffffffffffe) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) bind$xdp(r0, &(0x7f0000000080)={0x2c, 0x4, r2, 0x32, r0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:44 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab1acbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x80045430, 0x2) 23:52:44 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) [ 339.191345][T23648] encrypted_key: insufficient parameters specified 23:52:44 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x1000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 339.241444][T23658] encrypted_key: insufficient parameters specified 23:52:44 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6577206417cd34cdcc7edde33030303030303030303030343039360000000000400000000000060000007daf0c82e35e5a541d0567730f8b14d5b502eed5ad39dd85528bab2399131ea7214a6f77d5ab351d0e0e163dd4587957bbebc2b314ff54a82d0181e0696eed464b4b6803259ca70dfc0400dea598912f65597c7f938bf7e878c6dde9b6afed79afa08cf2d2321173f711c694ddea114c214b3de0f406"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x80045432, 0x2) 23:52:44 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab1bcbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 339.408670][T23673] encrypted_key: insufficient parameters specified 23:52:45 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:45 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab1ccbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) [ 339.465476][T23683] encrypted_key: insufficient parameters specified 23:52:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x80045438, 0x2) 23:52:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:45 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) 23:52:45 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab1dcbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:45 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:45 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x9000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x80045439, 0x2) 23:52:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e2a4385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:45 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x10000, 0xb, 0x7, 0x1, "5e9b5e3a355b9e9072a5512617509c2985fe0400fd3190b342562faccb7617684a3ff8fffffff35e6a30bbccac6dc400", "ef6050b73bbdca20212149b7f06e380d857cfe4ae5fbfed7130afe31b220810b", [0x0, 0x1ff]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:45 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:45 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:45 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) [ 339.981820][T23739] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e580d85a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x0) 23:52:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x80045440, 0x2) 23:52:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:45 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_GET_FLAGS(r1, 0x80044323, &(0x7f0000000000)) r2 = add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000001c0)="6921aa9e53d2894962232970722c198c94215bf73bf80ca9c43a4ecd4a9e0aa37e5464d3902a99b429b31b2a5f16ab6c222de919a0f7f93d22fbc537f81412be621d3a24860df1af64e3f51886df97cfdd3d08893af1eb4eaf1923e14a84d6ebd8f59246b66599e994faeedce08419a6b693bb47cc1b162a082010e8", 0x7c, 0xfffffffffffffffc) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, r2) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:45 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:45 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6e, 0x404c004, 0x0, 0x0) 23:52:45 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:45 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x40000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x800454d2, 0x2) 23:52:46 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) 23:52:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x226, 0x404c004, 0x0, 0x0) 23:52:46 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73797a20303030303030303030303030303030303430393600d4003f1cf0236f8594a44ead3b8ed8be6b45274279c1dfcbdfa7512c8122a53ca55f1cba1d595333f6bf9e106a3d68ca156f8a42dab0a222762da784a3f9afe90fea1d7844d96b50be65e5eced09b399f0ce0e7d86a9c1698ea3e383dcce91ba93495f2b6cbd98e36a71d4e2f0aba4b46f5485a28408b48234796b2c278789cc4955c62eb96be2520c55bda7afb330b277c1d3c782f415451a7c8e073c773956"], 0xfffffffffffffc48, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @multicast1}, &(0x7f0000000040)=0xc) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f00000001c0)='NET_DM\x00') getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x3321, 0x30}, &(0x7f0000000400)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000004c0)={r4, 0x3, 0x63, "acbd2c8515f062d55616e7606aac0dd0b5e337ef71d062ce5a128e6c40eab0de2fe61275cb2a383c704e71987c6dd2f0ea071df3dd114c43e1b231efdd6b725bde0413504cc30a6b21155309a006ad2229622752011a27489d9bd39e2a4a213c7970d6"}, 0x6b) sendmsg$NET_DM_CMD_STOP(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x2, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000080)={@rand_addr=0x7, @remote, r2}, 0xc) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000440)="5254ca2165fe14f1483fcbce32b52eb78fe3abc1b817852d5ac0bb4e8584938e818100000000000000c07255fbdf6c67daba618d247e54c5f50753a4a65e546809992f756daccc6b291eb8e628e746e34afcb698b5744378a984634c1e2db8e5880d0da5f095da22", 0x68, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfffffe00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:46 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:46 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x800455c9, 0x2) 23:52:46 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0xa000, 0x0) 23:52:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfeffff00000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0xb00, 0x404c004, 0x0, 0x0) 23:52:46 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:46 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) 23:52:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x800455ca, 0x2) 23:52:46 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x100000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:46 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 000000\x00\x00\x00\x00\x00\x00\x0096\x00\x00\x00\x00\x00\x00'], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x29d, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x22}}}}, 0x84) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:46 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x7f9e, 0x404c004, 0x0, 0x0) 23:52:46 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) 23:52:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x800455cc, 0x2) 23:52:46 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:46 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x20000c6f, 0x404c004, 0x0, 0x0) 23:52:46 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420754782723a73797a20303030303030303030303030303030303430393600"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x200000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:46 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) 23:52:46 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x80086301, 0x2) 23:52:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x300000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 341.190780][T23875] encrypted_key: master key parameter 'uG‚r:syz' is invalid 23:52:46 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:46 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) [ 341.237138][T23886] encrypted_key: master key parameter 'uG‚r:syz' is invalid 23:52:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x802c542a, 0x2) 23:52:46 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x4000) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x12, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r1, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x900000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0xfffffdef, 0x404c004, 0x0, 0x0) 23:52:47 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:52:47 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0xc0189436, 0x2) 23:52:47 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="64656661756c7420757365a23a73797a2030303030303030303030303030303030343092986399000000"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x20, 0x1f, 0x2, 0x2, 0x0, 0x1, 0x9, 0x2, 0x101, 0x7e0000000}) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xa00000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:47 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}}) [ 341.977336][T23926] encrypted_key: master key parameter 'use˘:syz' is invalid 23:52:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f00000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:47 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) [ 342.028368][T23936] encrypted_key: master key parameter 'use˘:syz' is invalid 23:52:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0xc020660b, 0x2) 23:52:47 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:47 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 342.261627][T23953] encrypted_key: keyword 'new' not allowed when called from .update method 23:52:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c002, 0x0, 0x0) 23:52:48 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4000000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0xc038563b, 0x2) 23:52:48 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:48 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x6, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000000)={0x5, 0x3, "7fbad35131d94cc2530f58398dfe91c4d8c2c740c94265ee80f3d2c6167aa96d", 0x2, 0x7, 0x7260, 0x3697, 0x88}) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:48 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:52:48 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) 23:52:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x200001ca, 0xfffffffffffffffe) 23:52:48 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x4000) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) ioctl$TCSETX(r1, 0x5433, &(0x7f0000000000)={0x5, 0x8, [0x4, 0x2e4, 0x9, 0x3, 0x80], 0x80000001}) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0xc0bc5310, 0x2) 23:52:48 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf8\x00'}}) 23:52:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c003, 0x0, 0x0) 23:52:48 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/185) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0xc1105511, 0x2) 23:52:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x3) 23:52:48 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:48 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf9\x00'}}) 23:52:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c009, 0x0, 0x0) 23:52:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='user:', 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:48 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c74207573658e55c8cc723a73797a203030303030303030303030303030303034"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:49 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfa\x00'}}) 23:52:49 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='children\x00') ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0245629, &(0x7f0000000080)={0x0, 0xffffffffffff7fff, 0x0, [], &(0x7f0000000040)}) 23:52:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x4) [ 343.444907][T24042] encrypted_key: master key parameter 'useŽUČĚr:syz' is invalid 23:52:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x2) 23:52:49 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00'}}) [ 343.537079][T24054] encrypted_key: master key parameter 'useŽUČĚr:syz' is invalid 23:52:49 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf8\xff\xff\xff\x00'}}) [ 343.578147][ T7] Bluetooth: hci0: Frame reassembly failed (-84) 23:52:49 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c7420757365723a73796720303030920706f6158839b957f83030303030303030"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:49 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfc\x00'}}) 23:52:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new defaq\x00\x00 user:syz 00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffa000/0x3000)=nil) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)='encrypted\x00', 0xa, 0x3) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:49 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x3) 23:52:49 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf9\xff\xff\xff\x00'}}) 23:52:49 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65772064656661756c74207573658e55c8cc723a73797a203030303030303030303030303030303034"], 0xfffffffffffffc48, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) connect$inet(0xffffffffffffffff, 0x0, 0x0) 23:52:49 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfd\x00'}}) 23:52:49 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfa\xff\xff\xff\x00'}}) [ 343.776162][T24078] encrypted_key: master key parameter 'defaq' is invalid [ 343.800842][T24083] encrypted_key: master key parameter 'defaq' is invalid [ 343.925668][T24091] encrypted_key: master key parameter 'useŽUČĚr:syz' is invalid [ 345.657706][ T3516] Bluetooth: hci0: command 0x1003 tx timeout [ 345.663967][T16631] Bluetooth: hci0: sending frame failed (-49) [ 347.737731][ T3516] Bluetooth: hci0: command 0x1001 tx timeout [ 347.743817][T16631] Bluetooth: hci0: sending frame failed (-49) [ 349.817731][ T9864] Bluetooth: hci0: command 0x1009 tx timeout 23:52:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x5) 23:52:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x4) 23:52:59 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00'}}) 23:52:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') write$cgroup_int(r0, &(0x7f0000000000)=0x2, 0x12) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0xde, 0x80}, {0x1c2f2bb0, 0x3}, 0x1, 0x6, 0x6}) waitid(0x2, r1, &(0x7f0000000240), 0x2100000a, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000200)={r0, 0x0, 0x1, r0}) add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 23:52:59 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00'}}) 23:52:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new defaq\x00\x00 user:syz 00000000000000004096\x00'], 0xfffffffffffffc48, 0x0) shmget$private(0x0, 0x3000, 0x78000000, &(0x7f0000ffa000/0x3000)=nil) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)='encrypted\x00', 0xa, 0x3) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:59 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00'}}) 23:52:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x7) 23:52:59 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfc\xff\xff\xff\x00'}}) [ 354.095523][T24103] encrypted_key: master key parameter 'defaq' is invalid 23:52:59 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0xfffffffffffffc48, 0x0) ioctl$void(r0, 0x79610cb88420d8b5) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'rose0\x00', 0x100}) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 23:52:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = inotify_init() unshare(0x600) sendfile(0xffffffffffffffff, r1, &(0x7f0000000040), 0x0) 23:52:59 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 23:52:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x6) 23:52:59 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfd\xff\xff\xff\x00'}}) 23:52:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0x9) 23:53:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f00000001c0)='wlan1bdev.\xb5\x00', 0xffffffffffffffff) add_key(&(0x7f00000004c0)='lo\xde+U\x98\xb6\x1e\x12\x9e\x1ago\\p2\x863\x05\xa9\xd9n6\f\'&\x17\xe7\xb2\x906D:\x8d:)E%IZ\xeaU\x9f\xa2\a\xc6\xddp\x98.v\xcd\x90J\xcb\x9e\xc7_\xd4\xdb\x18\xc5\xb7\x93\xcf\xa68\x90\xc1\xc6\xfc\xdd\x81\x8a\x9d\v7\xddb\xe5\xb2\x13\x15\x81\x06\xdb\x9b\x1c\x8fhY\x82\x05QjA\xbdw*\xa3\x1b\xf1\xde\x8b\xe0\x85\xeb;!G\x1f?y_!\x17\xc6\r\xeb&\aV0\xc2g\xfa\xe0${\xcc\xa0q\x1cD}X\xbb\xe5\xca2g\x97L\xe8\xebl\xcf\x01\xe2\xb0\xc2\xeb\a*\xb0\x9c\v~\xa7\f\rm\xd8\xf0\xd0g\xa7\xf3\tv\x99\xbe\xe0\xe4\x8e\xe4n?J\x9aB\x9b@\x1c\x15', &(0x7f0000000380)={'syz', 0x2}, &(0x7f0000000000)="39f5f884598d6cb43c29d6015d939fc7d39c16f1fb0b559ee150382535872d756233ad42158a39ea6fbdc86fab43cbef5fff50138708ce38d355d2a70533f024be64dcd145ea1b340e5774c7768c99d477b37079688af148c360e3a75bf8b5b6e543e658d3f664d2d2ea899a33fb03bd60d27ed41fb208d099216d83e41432f8b6ac5b8d9761641ded09a99648aec521155d39008c436d3744c75ce6527ce6c5e36c9c3f61e9a1f46ef5e2d98f8977", 0xffffffffffffff4a, r0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x202, 0x0) write$FUSE_INIT(r2, &(0x7f00000003c0)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x200, 0x2000010, 0x6e, 0x3, 0xee22, 0x8001}}, 0x50) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180)={0x514}, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xfffffffffffff001}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r3, 0x2}, &(0x7f0000000300)=0x8) 23:53:00 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) 23:53:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x8) 23:53:00 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}}) 23:53:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ppoll(&(0x7f0000000280)=[{r1}, {}, {r0}], 0x3, &(0x7f00000002c0), 0x0, 0x0) 23:53:00 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000040)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x144, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000c00)="bb02594661d88678c7b25743dadbaf89bc035b54d5c6617c1212f97aacd3b96728476bcdba074b4db015237093a049b591da4624cfd42f8077d63a56d928af6c570ddace070589041806619a2cef9fafd4cea03d9ee451a4fe2cab40cbfd9876ee7e584385a64ced55b79f87177dd6", 0x6f, 0x404c004, 0x0, 0xa) 23:53:00 executing program 5: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}}) 23:53:00 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) perf_event_open(&(0x7f0000000240)={0x2, 0x19e, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) 23:53:00 executing program 2: keyctl$dh_compute(0x17, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={'vmac64(anubis)\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00'}}) [ 354.612799][ T1518] ------------[ cut here ]------------ [ 354.618813][ T1518] WARNING: CPU: 0 PID: 1518 at drivers/tty/tty_ioctl.c:319 tty_set_termios.cold+0x11/0x23 [ 354.628709][ T1518] Kernel panic - not syncing: panic_on_warn set ... [ 354.635303][ T1518] CPU: 0 PID: 1518 Comm: kworker/u5:0 Not tainted 5.3.0-rc1+ #80 [ 354.643012][ T1518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.653143][ T1518] Workqueue: hci0 hci_power_on [ 354.657902][ T1518] Call Trace: [ 354.661202][ T1518] dump_stack+0x172/0x1f0 [ 354.665542][ T1518] ? tty_unthrottle_safe+0x130/0x17d [ 354.670830][ T1518] panic+0x2dc/0x755 [ 354.674731][ T1518] ? add_taint.cold+0x16/0x16 [ 354.679412][ T1518] ? __kasan_check_write+0x14/0x20 [ 354.684525][ T1518] ? __warn.cold+0x5/0x4c [ 354.688840][ T1518] ? __warn+0xe7/0x1e0 [ 354.692897][ T1518] ? tty_set_termios.cold+0x11/0x23 [ 354.698079][ T1518] __warn.cold+0x20/0x4c [ 354.702306][ T1518] ? tty_set_termios.cold+0x11/0x23 [ 354.707486][ T1518] report_bug+0x263/0x2b0 [ 354.711796][ T1518] do_error_trap+0x11b/0x200 [ 354.716365][ T1518] do_invalid_op+0x37/0x50 [ 354.720761][ T1518] ? tty_set_termios.cold+0x11/0x23 [ 354.725938][ T1518] invalid_op+0x23/0x30 [ 354.730081][ T1518] RIP: 0010:tty_set_termios.cold+0x11/0x23 [ 354.735867][ T1518] Code: ef e8 46 0b 2c fe e9 e8 fe ff ff e8 3c 0b 2c fe eb ae e8 35 0b 2c fe eb 84 e8 fe f3 f1 fd 48 c7 c7 60 d4 d0 87 e8 46 94 db fd <0f> 0b e9 d5 d5 ff ff 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 [ 354.755452][ T1518] RSP: 0018:ffff8880a67d7978 EFLAGS: 00010282 [ 354.761497][ T1518] RAX: 0000000000000024 RBX: ffff8880a67d7a38 RCX: 0000000000000000 [ 354.769467][ T1518] RDX: 0000000000000000 RSI: ffffffff815c51f6 RDI: ffffed1014cfaf21 [ 354.777418][ T1518] RBP: ffff8880a67d7a60 R08: 0000000000000024 R09: ffffed1015d060d1 [ 354.785371][ T1518] R10: ffffed1015d060d0 R11: ffff8880ae830687 R12: ffff8880a67d7aa0 [ 354.793321][ T1518] R13: 0000000000010004 R14: 1ffff11014cfaf4e R15: ffff888098d274c0 [ 354.801288][ T1518] ? vprintk_func+0x86/0x189 [ 354.805863][ T1518] ? tty_set_termios.cold+0x11/0x23 [ 354.811042][ T1518] ? hci_dev_do_open+0xa7/0x1940 [ 354.815963][ T1518] ? tty_wait_until_sent+0x580/0x580 [ 354.821234][ T1518] ? __mutex_lock+0x45d/0x13c0 [ 354.826001][ T1518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 354.832222][ T1518] ? tty_termios_encode_baud_rate+0x3ca/0x4e0 [ 354.838332][ T1518] hci_uart_set_baudrate+0x157/0x1c0 [ 354.843597][ T1518] ? hci_uart_set_speeds+0x90/0x90 [ 354.848709][ T1518] ? cpuacct_charge+0x1db/0x360 [ 354.853557][ T1518] ? __kasan_check_read+0x11/0x20 [ 354.858677][ T1518] hci_uart_setup+0xa2/0x4a0 [ 354.863253][ T1518] ? hci_uart_set_baudrate+0x1c0/0x1c0 [ 354.868710][ T1518] hci_dev_do_open+0x3e3/0x1940 [ 354.873578][ T1518] ? hci_rx_work+0xae0/0xae0 [ 354.878153][ T1518] ? trace_hardirqs_off+0x62/0x240 [ 354.883250][ T1518] ? __kasan_check_read+0x11/0x20 [ 354.888259][ T1518] ? process_one_work+0x89d/0x1740 [ 354.893353][ T1518] ? mark_held_locks+0xf0/0xf0 [ 354.898108][ T1518] hci_power_on+0x12d/0x680 [ 354.902591][ T1518] ? hci_error_reset+0xf0/0xf0 [ 354.907351][ T1518] ? lock_acquire+0x190/0x410 [ 354.912012][ T1518] ? process_one_work+0x8c1/0x1740 [ 354.917279][ T1518] ? trace_hardirqs_on+0x67/0x240 [ 354.922286][ T1518] process_one_work+0x9af/0x1740 [ 354.927222][ T1518] ? pwq_dec_nr_in_flight+0x320/0x320 [ 354.932577][ T1518] ? lock_acquire+0x190/0x410 [ 354.937238][ T1518] worker_thread+0x98/0xe40 [ 354.941723][ T1518] kthread+0x361/0x430 [ 354.945777][ T1518] ? process_one_work+0x1740/0x1740 [ 354.950971][ T1518] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 354.957217][ T1518] ret_from_fork+0x24/0x30 [ 354.962773][ T1518] Kernel Offset: disabled [ 354.967229][ T1518] Rebooting in 86400 seconds..