[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 43.155623][ T26] audit: type=1800 audit(1556743777.013:25): pid=7712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 43.195772][ T26] audit: type=1800 audit(1556743777.023:26): pid=7712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 43.229526][ T26] audit: type=1800 audit(1556743777.023:27): pid=7712 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. 2019/05/01 20:49:48 fuzzer started 2019/05/01 20:49:51 dialing manager at 10.128.0.26:36135 2019/05/01 20:49:51 syscalls: 2285 2019/05/01 20:49:51 code coverage: enabled 2019/05/01 20:49:51 comparison tracing: enabled 2019/05/01 20:49:51 extra coverage: extra coverage is not supported by the kernel 2019/05/01 20:49:51 setuid sandbox: enabled 2019/05/01 20:49:51 namespace sandbox: enabled 2019/05/01 20:49:51 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 20:49:51 fault injection: enabled 2019/05/01 20:49:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 20:49:51 net packet injection: enabled 2019/05/01 20:49:51 net device setup: enabled 20:52:07 executing program 0: syzkaller login: [ 194.145305][ T7878] IPVS: ftp: loaded support on port[0] = 21 20:52:08 executing program 1: [ 194.256462][ T7878] chnl_net:caif_netlink_parms(): no params data found [ 194.332400][ T7878] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.356434][ T7878] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.367666][ T7878] device bridge_slave_0 entered promiscuous mode [ 194.388346][ T7878] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.395532][ T7878] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.427299][ T7878] device bridge_slave_1 entered promiscuous mode [ 194.449574][ T7878] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.450299][ T7881] IPVS: ftp: loaded support on port[0] = 21 [ 194.464114][ T7878] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 194.492092][ T7878] team0: Port device team_slave_0 added [ 194.520628][ T7878] team0: Port device team_slave_1 added 20:52:08 executing program 2: [ 194.669477][ T7878] device hsr_slave_0 entered promiscuous mode [ 194.696184][ T7883] IPVS: ftp: loaded support on port[0] = 21 20:52:08 executing program 3: [ 194.726887][ T7878] device hsr_slave_1 entered promiscuous mode [ 194.928740][ T7878] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.936019][ T7878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.944019][ T7878] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.946776][ T7886] IPVS: ftp: loaded support on port[0] = 21 [ 194.951152][ T7878] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.032186][ T7881] chnl_net:caif_netlink_parms(): no params data found 20:52:08 executing program 4: [ 195.249872][ T7878] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.257207][ T7881] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.264290][ T7881] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.274723][ T7890] IPVS: ftp: loaded support on port[0] = 21 [ 195.283026][ T7881] device bridge_slave_0 entered promiscuous mode [ 195.307325][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.318069][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.328386][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 195.360894][ T7881] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.369506][ T7881] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.379209][ T7881] device bridge_slave_1 entered promiscuous mode [ 195.411715][ T7886] chnl_net:caif_netlink_parms(): no params data found [ 195.438903][ T7878] 8021q: adding VLAN 0 to HW filter on device team0 20:52:09 executing program 5: [ 195.459537][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.470206][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.482416][ T7883] chnl_net:caif_netlink_parms(): no params data found [ 195.512041][ T7881] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 195.528635][ T7881] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.568167][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.582136][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.592509][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.599711][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.612958][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.622077][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.634842][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.642015][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.654843][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 195.671365][ T7894] IPVS: ftp: loaded support on port[0] = 21 [ 195.731985][ T7886] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.739445][ T7886] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.749652][ T7886] device bridge_slave_0 entered promiscuous mode [ 195.758492][ T7881] team0: Port device team_slave_0 added [ 195.764401][ T7886] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.771673][ T7886] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.779579][ T7886] device bridge_slave_1 entered promiscuous mode [ 195.793693][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 195.819936][ T7881] team0: Port device team_slave_1 added [ 195.879462][ T7883] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.887043][ T7883] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.894868][ T7883] device bridge_slave_0 entered promiscuous mode [ 195.902939][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.912548][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.921271][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.930240][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.938965][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.947319][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.955805][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.979094][ T7886] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.008110][ T7890] chnl_net:caif_netlink_parms(): no params data found [ 196.018015][ T7883] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.025590][ T7883] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.034337][ T7883] device bridge_slave_1 entered promiscuous mode [ 196.064040][ T7886] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.087374][ T7886] team0: Port device team_slave_0 added [ 196.149402][ T7881] device hsr_slave_0 entered promiscuous mode [ 196.207152][ T7881] device hsr_slave_1 entered promiscuous mode [ 196.278435][ T7883] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.289912][ T7878] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 196.304379][ T7878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.313522][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.322718][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.331993][ T7886] team0: Port device team_slave_1 added [ 196.351926][ T7883] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.392915][ T7883] team0: Port device team_slave_0 added [ 196.419374][ T7890] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.429061][ T7890] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.440270][ T7890] device bridge_slave_0 entered promiscuous mode [ 196.453158][ T7883] team0: Port device team_slave_1 added [ 196.478873][ T7890] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.486002][ T7890] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.494266][ T7890] device bridge_slave_1 entered promiscuous mode [ 196.581495][ T7886] device hsr_slave_0 entered promiscuous mode [ 196.646746][ T7886] device hsr_slave_1 entered promiscuous mode [ 196.736031][ T7890] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 196.749579][ T7878] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 196.798307][ T7883] device hsr_slave_0 entered promiscuous mode [ 196.836757][ T7883] device hsr_slave_1 entered promiscuous mode [ 196.904731][ T7890] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 196.963062][ T7890] team0: Port device team_slave_0 added [ 196.987796][ T7894] chnl_net:caif_netlink_parms(): no params data found [ 197.007948][ T7890] team0: Port device team_slave_1 added 20:52:10 executing program 0: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0) [ 197.128573][ T7890] device hsr_slave_0 entered promiscuous mode [ 197.161588][ C1] hrtimer: interrupt took 35860 ns [ 197.186822][ T7890] device hsr_slave_1 entered promiscuous mode [ 197.234435][ T7881] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.295775][ T7894] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.303425][ T7894] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.311765][ T7894] device bridge_slave_0 entered promiscuous mode [ 197.320478][ T7894] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.328326][ T7894] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.336047][ T7894] device bridge_slave_1 entered promiscuous mode [ 197.348934][ T7890] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.356037][ T7890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.363595][ T7890] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.370762][ T7890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.394279][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 197.404917][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 197.418862][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.427288][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.437712][ T7881] 8021q: adding VLAN 0 to HW filter on device team0 20:52:11 executing program 0: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="0180c20023fddb4380c200000086dd603e215b5beb434af3190fb71ad6ebb5529d01080000fe8000000000000000000000000000bb000000000000000000000000000010000420880b0000000000000800000086dd080088be00c6534935412bbe7100000000000000080022eb00000000200000000200000000000000000000000800655800000000c53f9bc10b5218fbe6b21126ec5dfd4b51895eeac0d7432a9d9c8c399f1afbbb8f1881b91980e74888ed41c404a8703c9dc1d8bafc100e2000000000000000000088b383881e3a071f8fc21f38cb7ffcdb03d4deb8c6d379f41bc24a916a8b1b6b273f810f767c7520b7f6b0ca7326a75ba6ca9e1dadc8a440eb4b764e0f29bc3b020000008c6f4f0b195587ebc281a14d645712786055a85fa2f0597e5b06f554ef6536cbef44461b195c4a39e7f2e65e4c40fe1ad024319592743ab7ebe99d397ef4d81cd3bca637aa32fbb0205fa83ce13b0277825ee8de7e55926a410d09a500e29e15f9064d05e293eb2cda98aada7d83db9c36a40f147f646d4e0e0000000700000000000000f7c590297f1433dd1e7a6276f5b6f5cf6f2d8880c876ba6a6fb0a2981e84759097943e4a32448df4e83e66022bdcf4e63b731e75bef73a8381fd2e461e044a515065129405ed732a1eb83749d2bfaf1f4aacd6c18a106ad9d39133e70ccd6433ffeac69f56765f5e92ca3c222a3d947337591cfaed9b71bb7b547cdfca4a296ee820f873adb0617836c1ee3c96fc00263bd7164c4642bf497d836519c2e846c10380a4b20d638973450f01083ecd420600000000000000322d0000a52d0134ec1c0cf7fc8f1ed7c92a0242f7aa9b2d8e6c9a49de96c1c06e578c7760caa44e428b88bf8c1141be11fdc4bd7a7aa6fb98f6cae511b6714f83b9b7859bfa89f0e8c110097d58f1439b41840b1605a5af8b8d73e67da383466e0c4829b46a2cde86511d4c4365f85940c6ff21a4788dce270819b89c56dd12fefc9ffbb0a88e954ccfcdebbcae0264bdd1ac24b0c3b256610f8fdd4cab03c6f96f72e208ee04a24dd32ea37c97a839f3221ad45cea974154ecdb229243441de561cb42e1c1cf2e9b12a882054ad64441a4cc286db4cdf0e7c905c2d01e190d7860da499a88b22d2d67a45bd67376f976bb8f99f220ed6ab34dc8bce90a01b789351a62849efac3e785a47e5cda25a7c6cc10c05fc58ca117ab2f31092236e6cbbde89c8d89a50cdd1a88c3cc27ff1bfd2fb3781d18ac39f1db22aedd78707f67c7ffc1f48b2d9d0ce0bb6792654a0000000000000000000000000000007ff80b8afb64f400c1fb8e6c7f75a7a3d1a75521d5f41a8d398950e8b991cdc9000a499d800ff8364cb40e20428e5f59d70c6391ab550364352a718dddf2df6bccfda58355827dafed7ed47347592d357238a4ca9d682b6594568bfbed2c89b27e179c74f0e4c2e2ff200f4c90f037541da5ef062c"], 0x0) [ 197.462835][ T7894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 197.483954][ T7886] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.501433][ T7894] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 197.531142][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.550640][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.568683][ T2996] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.575817][ T2996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.585530][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.595778][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.604335][ T2996] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.611436][ T2996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.620578][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 20:52:11 executing program 0: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0) [ 197.634342][ T7883] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.654689][ T7894] team0: Port device team_slave_0 added [ 197.698201][ T7886] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.717327][ T7894] team0: Port device team_slave_1 added [ 197.725605][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.735028][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.744675][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.808564][ T7894] device hsr_slave_0 entered promiscuous mode [ 197.856913][ T7894] device hsr_slave_1 entered promiscuous mode [ 197.902970][ T7883] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.910520][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.919698][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.928632][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.938228][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.947447][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.955840][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.962943][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.970875][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.979484][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.017320][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.026088][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.044008][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.054283][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.063156][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.070298][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.079527][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.088712][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.097778][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.106416][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.114923][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.123646][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.132566][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.143450][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.151798][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.159085][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state 20:52:12 executing program 0: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0) [ 198.169100][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.191082][ T7881] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 198.212287][ T7881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.260528][ T7890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.274922][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.284104][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.292841][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.301857][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.311000][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.319954][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.328658][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.337748][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.346135][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.353247][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.361152][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.392918][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.401007][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.409715][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.418573][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.427637][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.435850][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.444575][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.453532][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.462496][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.471400][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.480061][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.493172][ T7890] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.503701][ T7886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 20:52:12 executing program 0: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0) [ 198.525318][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.544629][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.560013][ T7881] 8021q: adding VLAN 0 to HW filter on device batadv0 20:52:12 executing program 0: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0) [ 198.634129][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.651594][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.680763][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.700016][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.708978][ T7891] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.716038][ T7891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.723863][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.732483][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.741025][ T7891] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.748130][ T7891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.755767][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.771850][ T7886] 8021q: adding VLAN 0 to HW filter on device batadv0 20:52:12 executing program 1: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="0180c20023fddb4380c200000086dd603e215b5beb434af3190fb71ad6ebb5529d01080000fe8000000000000000000000000000bb000000000000000000000000000010000420880b0000000000000800000086dd080088be00c6534935412bbe7100000000000000080022eb00000000200000000200000000000000000000000800655800000000c53f9bc10b5218fbe6b21126ec5dfd4b51895eeac0d7432a9d9c8c399f1afbbb8f1881b91980e74888ed41c404a8703c9dc1d8bafc100e2000000000000000000088b383881e3a071f8fc21f38cb7ffcdb03d4deb8c6d379f41bc24a916a8b1b6b273f810f767c7520b7f6b0ca7326a75ba6ca9e1dadc8a440eb4b764e0f29bc3b020000008c6f4f0b195587ebc281a14d645712786055a85fa2f0597e5b06f554ef6536cbef44461b195c4a39e7f2e65e4c40fe1ad024319592743ab7ebe99d397ef4d81cd3bca637aa32fbb0205fa83ce13b0277825ee8de7e55926a410d09a500e29e15f9064d05e293eb2cda98aada7d83db9c36a40f147f646d4e0e0000000700000000000000f7c590297f1433dd1e7a6276f5b6f5cf6f2d8880c876ba6a6fb0a2981e84759097943e4a32448df4e83e66022bdcf4e63b731e75bef73a8381fd2e461e044a515065129405ed732a1eb83749d2bfaf1f4aacd6c18a106ad9d39133e70ccd6433ffeac69f56765f5e92ca3c222a3d947337591cfaed9b71bb7b547cdfca4a296ee820f873adb0617836c1ee3c96fc00263bd7164c4642bf497d836519c2e846c10380a4b20d638973450f01083ecd420600000000000000322d0000a52d0134ec1c0cf7fc8f1ed7c92a0242f7aa9b2d8e6c9a49de96c1c06e578c7760caa44e428b88bf8c1141be11fdc4bd7a7aa6fb98f6cae511b6714f83b9b7859bfa89f0e8c110097d58f1439b41840b1605a5af8b8d73e67da383466e0c4829b46a2cde86511d4c4365f85940c6ff21a4788dce270819b89c56dd12fefc9ffbb0a88e954ccfcdebbcae0264bdd1ac24b0c3b256610f8fdd4cab03c6f96f72e208ee04a24dd32ea37c97a839f3221ad45cea974154ecdb229243441de561cb42e1c1cf2e9b12a882054ad64441a4cc286db4cdf0e7c905c2d01e190d7860da499a88b22d2d67a45bd67376f976bb8f99f220ed6ab34dc8bce90a01b789351a62849efac3e785a47e5cda25a7c6cc10c05fc58ca117ab2f31092236e6cbbde89c8d89a50cdd1a88c3cc27ff1bfd2fb3781d18ac39f1db22aedd78707f67c7ffc1f48b2d9d0ce0bb6792654a0000000000000000000000000000007ff80b8afb64f400c1fb8e6c7f75a7a3d1a75521d5f41a8d398950e8b991cdc9000a499d800ff8364cb40e20428e5f59d70c6391ab550364352a718dddf2df6bccfda58355827dafed7ed47347592d357238a4ca9d682b6594568bfbed2c89b27e179c74f0e4c2e2ff200f4c90f037541da5ef062c"], 0x0) [ 198.823648][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.840342][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.853293][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 20:52:12 executing program 0: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0) [ 198.892328][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.920096][ T7894] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.945008][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.973195][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.045292][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.060550][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.072157][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.083457][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.092127][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.101570][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 199.110265][ T2996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 199.124016][ T7883] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.135060][ T7894] 8021q: adding VLAN 0 to HW filter on device team0 [ 199.192781][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.202183][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.211840][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 199.224705][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 199.240018][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.247171][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.267646][ T7890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 20:52:13 executing program 3: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0) 20:52:13 executing program 0: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb943648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edbe2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef443394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06f485a47b4a55ed389bc1734541232cd41908b5cfa4b8fcfcafce500a0c7ae99767713a98e7927aa69f6ccd7daea62f19ceb82559f41899c9", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="0180c20023fddb4380c200000086dd603e215b5beb434af3190fb71ad6ebb5529d01080000fe8000000000000000000000000000bb000000000000000000000000000010000420880b0000000000000800000086dd080088be00c6534935412bbe7100000000000000080022eb00000000200000000200000000000000000000000800655800000000c53f9bc10b5218fbe6b21126ec5dfd4b51895eeac0d7432a9d9c8c399f1afbbb8f1881b91980e74888ed41c404a8703c9dc1d8bafc100e2000000000000000000088b383881e3a071f8fc21f38cb7ffcdb03d4deb8c6d379f41bc24a916a8b1b6b273f810f767c7520b7f6b0ca7326a75ba6ca9e1dadc8a440eb4b764e0f29bc3b020000008c6f4f0b195587ebc281a14d645712786055a85fa2f0597e5b06f554ef6536cbef44461b195c4a39e7f2e65e4c40fe1ad024319592743ab7ebe99d397ef4d81cd3bca637aa32fbb0205fa83ce13b0277825ee8de7e55926a410d09a500e29e15f9064d05e293eb2cda98aada7d83db9c36a40f147f646d4e0e0000000700000000000000f7c590297f1433dd1e7a6276f5b6f5cf6f2d8880c876ba6a6fb0a2981e84759097943e4a32448df4e83e66022bdcf4e63b731e75bef73a8381fd2e461e044a515065129405ed732a1eb83749d2bfaf1f4aacd6c18a106ad9d39133e70ccd6433ffeac69f56765f5e92ca3c222a3d947337591cfaed9b71bb7b547cdfca4a296ee820f873adb0617836c1ee3c96fc00263bd7164c4642bf497d836519c2e846c10380a4b20d638973450f01083ecd420600000000000000322d0000a52d0134ec1c0cf7fc8f1ed7c92a0242f7aa9b2d8e6c9a49de96c1c06e578c7760caa44e428b88bf8c1141be11fdc4bd7a7aa6fb98f6cae511b6714f83b9b7859bfa89f0e8c110097d58f1439b41840b1605a5af8b8d73e67da383466e0c4829b46a2cde86511d4c4365f85940c6ff21a4788dce270819b89c56dd12fefc9ffbb0a88e954ccfcdebbcae0264bdd1ac24b0c3b256610f8fdd4cab03c6f96f72e208ee04a24dd32ea37c97a839f3221ad45cea974154ecdb229243441de561cb42e1c1cf2e9b12a882054ad64441a4cc286db4cdf0e7c905c2d01e190d7860da499a88b22d2d67a45bd67376f976bb8f99f220ed6ab34dc8bce90a01b789351a62849efac3e785a47e5cda25a7c6cc10c05fc58ca117ab2f31092236e6cbbde89c8d89a50cdd1a88c3cc27ff1bfd2fb3781d18ac39f1db22aedd78707f67c7ffc1f48b2d9d0ce0bb6792654a0000000000000000000000000000007ff80b8afb64f400c1fb8e6c7f75a7a3d1a75521d5f41a8d398950e8b991cdc9000a499d800ff8364cb40e20428e5f59d70c6391ab550364352a718dddf2df6bccfda58355827dafed7ed47347592d357238a4ca9d682b6594568bfbed2c89b27e179c74f0e4c2e2ff200f4c90f037541da5ef062c"], 0x0) [ 199.292720][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.307695][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.327227][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.348807][ T7891] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.355904][ T7891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.421313][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.431359][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.441345][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.451716][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.460713][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.477996][ T7890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.505952][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.520679][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.535425][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.545015][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 199.559854][ T7894] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.579961][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.597741][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.606211][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 20:52:13 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xff9d, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000000501010000000000"], 0x14}}, 0x0) [ 199.641063][ T7894] 8021q: adding VLAN 0 to HW filter on device batadv0 20:52:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240), 0x8) 20:52:13 executing program 1: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0) 20:52:13 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xfffffffffffffdd0) clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x1, 0x0) 20:52:13 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) r1 = io_uring_setup(0x64, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000003c0)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000014c0)={0xe, 0x7, 0x7fffffff, 0x728, 0x8a, "87f9e38c6660ff5b7266c16fe6e52df6553d5931e3843df2aee06176014b5a878f2a540c623241a3a30eed3735959c84af992018f09100606214e012391b35de393908aad1637025c7fb8501def7aaf35886ad1faa159155ab9afcb74ce52e26e222ee3a25cc7535c147a9c58a1677c272e0f47ab6e570dd835f744f318c499d1ae2d78e9e1f817bb99d"}, 0x96) semctl$IPC_INFO(0x0, 0x4, 0x3, &(0x7f00000004c0)=""/4096) 20:52:13 executing program 0: socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x8000, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x3, 0x7ffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0x28) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000004fc0)={0x0, 0x0, 0x2080}) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000280)=r0, 0x4) r2 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0xffffffffffffff2c) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @loopback}, 0x1c7) ioctl$int_in(r2, 0x5421, &(0x7f0000000900)=0x6) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000040)=0x4, 0x4) sendto$inet(r0, &(0x7f0000000a00)="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", 0x241, 0xffffffffffffffff, 0x0, 0x0) r3 = mq_open(&(0x7f0000000480)='!seli\xf2Mnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000400)={0xffffffffffffffff, 0x9, 0x5, 0x2, 0x40000000002, 0x80000001, 0x3, 0xfffffffffffffffc}) mq_timedsend(r3, &(0x7f0000000040), 0x0, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/122) ioctl(r1, 0x4, &(0x7f0000000540)="2b1728fb5dd81cbbb56cab597e843af21302d5d07361f4c322e7ef37356e1668e6a1843697a12e4fb9c896ff49d980627f009eb141510e58c489d994af34ef505850e35ed969ae0b2799a2e6095c9dc8accbf993f76ca99e07f34621a53b94f8f2") mq_timedsend(r3, &(0x7f0000000080), 0x0, 0x0, 0x0) mq_timedreceive(r3, &(0x7f0000000100)=""/24, 0x18, 0x0, 0x0) getcwd(&(0x7f00000004c0)=""/118, 0xfefb) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000240), 0x14) syz_emit_ethernet(0x1, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x0) 20:52:13 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000000280)={0x0, 'syz1\x00', 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xe3\x1e\x0e\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x660c17e9617f2d6c, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000580)=""/231, 0xe7}, {&(0x7f0000000040)=""/13, 0x3}], 0x2) 20:52:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000100)=0x7) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0x8, 0x4) [ 199.836008][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.853516][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.892610][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.918375][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.935195][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 20:52:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getgid() [ 199.962636][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 199.983460][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 20:52:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000040)={0x1, 0x0, {0x5, 0x3, 0x7, 0xe3f}}) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="ac516b2af2a7aedf7e263ab23be0093b2d22b141f77188f4c8fcd0fa257432c30fcc2e5573ac739a92fab69309f7c776f447efb5138209563e599aa8022a08573b5529d6f76581561c996e328b606b50c33aa39f0da5380a82f5652749498b9d1642fb9201b0c320c912ea0c3846c5ab85b94edf0f503ccca2cfb94e014224cf0a8ccb228b65959be702ec27b3e9bb5e828b5c11ca3498975a12cf0ce731ac67b7e28d672a83f7fcec60ea7d2e62c1d423ae662fca", 0xb5, 0x4, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000003c0)=0x7ffffffe) r0 = semget(0x2, 0x40000000000, 0x10000000200) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000001c0)=""/121) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'bpq0\x00', {0x2, 0x4e23, @multicast2}}) unshare(0x40000000) 20:52:13 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) r1 = io_uring_setup(0x64, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000003c0)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000014c0)={0xe, 0x7, 0x7fffffff, 0x728, 0x8a, "87f9e38c6660ff5b7266c16fe6e52df6553d5931e3843df2aee06176014b5a878f2a540c623241a3a30eed3735959c84af992018f09100606214e012391b35de393908aad1637025c7fb8501def7aaf35886ad1faa159155ab9afcb74ce52e26e222ee3a25cc7535c147a9c58a1677c272e0f47ab6e570dd835f744f318c499d1ae2d78e9e1f817bb99d"}, 0x96) semctl$IPC_INFO(0x0, 0x4, 0x3, &(0x7f00000004c0)=""/4096) 20:52:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240), 0x8) 20:52:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x400, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000100)=0x7) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0x8, 0x4) [ 200.003979][ T7984] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 200.023699][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 200.052635][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 200.093734][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 200.123521][ T7891] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 200.191043][ T7891] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 20:52:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240), 0x8) 20:52:14 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) r1 = io_uring_setup(0x64, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000003c0)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000014c0)={0xe, 0x7, 0x7fffffff, 0x728, 0x8a, "87f9e38c6660ff5b7266c16fe6e52df6553d5931e3843df2aee06176014b5a878f2a540c623241a3a30eed3735959c84af992018f09100606214e012391b35de393908aad1637025c7fb8501def7aaf35886ad1faa159155ab9afcb74ce52e26e222ee3a25cc7535c147a9c58a1677c272e0f47ab6e570dd835f744f318c499d1ae2d78e9e1f817bb99d"}, 0x96) semctl$IPC_INFO(0x0, 0x4, 0x3, &(0x7f00000004c0)=""/4096) 20:52:14 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syncfs(r1) openat$capi20(0xffffffffffffff9c, &(0x7f0000000480)='/dev/capi20\x00', 0x4000, 0x0) ppoll(&(0x7f0000000140)=[{r2, 0x44}], 0x1, &(0x7f0000000200), &(0x7f0000000340), 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r4 = memfd_create(&(0x7f0000000240)='t\bu\x00\x00\x01\x00\x00\x8c\x0f\x00\x00\x00\x00\x88\xcb&\x96}\xdb\xfb\xe4\x1e\xb0\xde\x1c\x0f\t\x92<\xe7#\x04n\xcfc\x1a\xdfI\xd1\xb9\xb1\xe1\xea8\xe2g|\x96\xb3\xa7!\x1d}\xe7\x81\xb3\x86\x19\xd7\\\xc4\xe7\xcb\x9f\x91\xa4\x84EH\x0f\xf3E=\xb2\x9bt\x1a\xf06r9:\xea\x13WaHSa\x8a\xf8\xd6YF\xb9c\x18)\xadG\xa7\xfa\xc00\xd1\x84\xd8\xafP\v\x16\xb2\x92\x92\xabX/\xf1\x9cRp0\x02ye\xe5l`\xfdm\x12\xa7\x84\x9a\xe8\x11\xf7#\xd3Q\x0f\x002\xba\xa1\x11\xbf\x1b\x19\xf6\xac$Rj\x88\xc0\xd7\x1ca \x98\xe9w\xcb+\x7f\r\xdc\x1b\x1au\xdfK\xb43}\xba2\x8f\x03\xbaX\xeah\xce\xd8K\xfa\x90\xa7A\xed\xfbf\xd1', 0x0) ftruncate(r4, 0x321) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x4, 0x0) ioctl$TIOCSRS485(r5, 0x542f, &(0x7f00000003c0)={0x1, 0x100000001, 0x6}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl(0xffffffffffffffff, 0x7fffffff, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x2000005) dup2(r4, r3) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) prctl$PR_SET_FPEMU(0xa, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_TIMEOUT(r6, 0x0, 0x48a, &(0x7f0000000380)={0x8}, 0xc) 20:52:14 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) inotify_init1(0x0) [ 200.405512][ T7986] IPVS: ftp: loaded support on port[0] = 21 20:52:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240), 0x8) [ 200.471011][ T8001] kvm: emulating exchange as write 20:52:14 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) r1 = io_uring_setup(0x64, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000003c0)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000014c0)={0xe, 0x7, 0x7fffffff, 0x728, 0x8a, "87f9e38c6660ff5b7266c16fe6e52df6553d5931e3843df2aee06176014b5a878f2a540c623241a3a30eed3735959c84af992018f09100606214e012391b35de393908aad1637025c7fb8501def7aaf35886ad1faa159155ab9afcb74ce52e26e222ee3a25cc7535c147a9c58a1677c272e0f47ab6e570dd835f744f318c499d1ae2d78e9e1f817bb99d"}, 0x96) semctl$IPC_INFO(0x0, 0x4, 0x3, &(0x7f00000004c0)=""/4096) [ 200.625923][ T8010] encrypted_key: master key parameter 'defuît' is invalid 20:52:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) getsockopt$bt_BT_DEFER_SETUP(r2, 0x112, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 200.795949][ T8026] encrypted_key: master key parameter 'defuît' is invalid 20:52:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffec7) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getgid() [ 200.955495][ T8038] IPVS: ftp: loaded support on port[0] = 21 20:52:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(0xffffffffffffffff, 0xc038563b, &(0x7f0000000040)={0x1, 0x0, {0x5, 0x3, 0x7, 0xe3f}}) ioctl$VIDIOC_S_PRIORITY(0xffffffffffffffff, 0x40045644, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000240)="ac516b2af2a7aedf7e263ab23be0093b2d22b141f77188f4c8fcd0fa257432c30fcc2e5573ac739a92fab69309f7c776f447efb5138209563e599aa8022a08573b5529d6f76581561c996e328b606b50c33aa39f0da5380a82f5652749498b9d1642fb9201b0c320c912ea0c3846c5ab85b94edf0f503ccca2cfb94e014224cf0a8ccb228b65959be702ec27b3e9bb5e828b5c11ca3498975a12cf0ce731ac67b7e28d672a83f7fcec60ea7d2e62c1d423ae662fca", 0xb5, 0x4, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000003c0)=0x7ffffffe) r0 = semget(0x2, 0x40000000000, 0x10000000200) semctl$GETALL(r0, 0x0, 0xd, &(0x7f00000001c0)=""/121) syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'bpq0\x00', {0x2, 0x4e23, @multicast2}}) unshare(0x40000000) 20:52:14 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) inotify_init1(0x0) 20:52:14 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syncfs(r1) openat$capi20(0xffffffffffffff9c, &(0x7f0000000480)='/dev/capi20\x00', 0x4000, 0x0) ppoll(&(0x7f0000000140)=[{r2, 0x44}], 0x1, &(0x7f0000000200), &(0x7f0000000340), 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r4 = memfd_create(&(0x7f0000000240)='t\bu\x00\x00\x01\x00\x00\x8c\x0f\x00\x00\x00\x00\x88\xcb&\x96}\xdb\xfb\xe4\x1e\xb0\xde\x1c\x0f\t\x92<\xe7#\x04n\xcfc\x1a\xdfI\xd1\xb9\xb1\xe1\xea8\xe2g|\x96\xb3\xa7!\x1d}\xe7\x81\xb3\x86\x19\xd7\\\xc4\xe7\xcb\x9f\x91\xa4\x84EH\x0f\xf3E=\xb2\x9bt\x1a\xf06r9:\xea\x13WaHSa\x8a\xf8\xd6YF\xb9c\x18)\xadG\xa7\xfa\xc00\xd1\x84\xd8\xafP\v\x16\xb2\x92\x92\xabX/\xf1\x9cRp0\x02ye\xe5l`\xfdm\x12\xa7\x84\x9a\xe8\x11\xf7#\xd3Q\x0f\x002\xba\xa1\x11\xbf\x1b\x19\xf6\xac$Rj\x88\xc0\xd7\x1ca \x98\xe9w\xcb+\x7f\r\xdc\x1b\x1au\xdfK\xb43}\xba2\x8f\x03\xbaX\xeah\xce\xd8K\xfa\x90\xa7A\xed\xfbf\xd1', 0x0) ftruncate(r4, 0x321) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x4, 0x0) ioctl$TIOCSRS485(r5, 0x542f, &(0x7f00000003c0)={0x1, 0x100000001, 0x6}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl(0xffffffffffffffff, 0x7fffffff, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x2000005) dup2(r4, r3) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) prctl$PR_SET_FPEMU(0xa, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_TIMEOUT(r6, 0x0, 0x48a, &(0x7f0000000380)={0x8}, 0xc) 20:52:14 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) r1 = io_uring_setup(0x64, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000003c0)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000014c0)={0xe, 0x7, 0x7fffffff, 0x728, 0x8a, "87f9e38c6660ff5b7266c16fe6e52df6553d5931e3843df2aee06176014b5a878f2a540c623241a3a30eed3735959c84af992018f09100606214e012391b35de393908aad1637025c7fb8501def7aaf35886ad1faa159155ab9afcb74ce52e26e222ee3a25cc7535c147a9c58a1677c272e0f47ab6e570dd835f744f318c499d1ae2d78e9e1f817bb99d"}, 0x96) semctl$IPC_INFO(0x0, 0x4, 0x3, &(0x7f00000004c0)=""/4096) 20:52:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet(0xa, 0x801, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:15 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) r1 = io_uring_setup(0x64, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000003c0)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) write$UHID_SET_REPORT_REPLY(r0, &(0x7f00000014c0)={0xe, 0x7, 0x7fffffff, 0x728, 0x8a, "87f9e38c6660ff5b7266c16fe6e52df6553d5931e3843df2aee06176014b5a878f2a540c623241a3a30eed3735959c84af992018f09100606214e012391b35de393908aad1637025c7fb8501def7aaf35886ad1faa159155ab9afcb74ce52e26e222ee3a25cc7535c147a9c58a1677c272e0f47ab6e570dd835f744f318c499d1ae2d78e9e1f817bb99d"}, 0x96) [ 201.250257][ T8045] encrypted_key: master key parameter 'defuît' is invalid 20:52:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet(0xa, 0x801, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:15 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) inotify_init1(0x0) 20:52:15 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) inotify_init1(0x0) 20:52:15 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) r1 = io_uring_setup(0x64, &(0x7f0000000040)) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f00000003c0)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) [ 201.573371][ T8055] IPVS: ftp: loaded support on port[0] = 21 [ 201.732921][ T8076] encrypted_key: master key parameter 'defuît' is invalid [ 201.772398][ T8077] encrypted_key: master key parameter 'defuît' is invalid 20:52:15 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) inotify_init1(0x0) [ 202.043137][ T8089] encrypted_key: master key parameter 'defuît' is invalid 20:52:16 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r1, 0x0) syz_emit_ethernet(0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaab1fb81e00bd7e69d450d1b41f2aaaaaaaa0180c2210000ae6b63a3e89ca2cd0600fe800000ed00000000100d00000000aa000000000000b3040d3000aa00004e204ba619211305a13d755b8aa2ce5310371c8728118b34c808106fc157925298396c86", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESDEC=r1]], 0x0) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) 20:52:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$inet(0xa, 0x801, 0x84) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:16 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) r1 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) 20:52:16 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) inotify_init1(0x0) 20:52:16 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) inotify_init1(0x0) 20:52:16 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0xffffff8b) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="ab553fec94248c32e27d040000bfec0028", 0x11) fchmod(0xffffffffffffffff, 0x100) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000200)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000240)={0x0, 0x0, 0xf2bc}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000280)={r2, r1, 0x5}) syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000180)={r3, 0x80000, r0}) 20:52:16 executing program 1: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$instantiate(0xc, r0, &(0x7f0000000080)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', '@\xec'}, 0x36f666d65897da67, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 202.282873][ T8096] encrypted_key: master key parameter 'defuît' is invalid [ 202.312874][ T8098] encrypted_key: master key parameter 'defuît' is invalid 20:52:16 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) [ 202.335160][ T8115] encrypted_key: insufficient parameters specified 20:52:16 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:16 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8, 0x2000) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x7fff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000140)={r1, 0x3ff, 0x2b, "4f9292ba2e7757b5df8588ea9915fb6933d3a447f9e28924c1ab6e477dc4aa8625e20bf4ddd4f4f701c05a"}, 0x33) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x11) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@broadcast, @link_local, [{[], {0x8100, 0x8, 0x4, 0x2}}], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x0, 0x0, @remote={0xfe, 0x80, [0x2], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14, 0x5], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x4]}, @mcast2}}}}}}}, 0x0) [ 202.386092][ T8119] encrypted_key: insufficient parameters specified 20:52:16 executing program 4: capset(&(0x7f0000000240)={0x20080522}, &(0x7f0000000280)) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x50) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f00000000c0)={0xa, 0x0, [{0xc000001d, 0x7fffffff, 0xe113, 0x1800000000000000, 0x6}, {0x8000001f, 0x8001, 0x4, 0xb2, 0xde}, {0x80000000, 0x4, 0xfffffffffffff800, 0x5, 0x100000001}, {0x1, 0x7, 0x2, 0xfffffffffffff001, 0x9}, {0xc0000001, 0x6, 0x100, 0x69501004, 0x9}, {0xc0000007, 0x4, 0x2, 0xff, 0x6}, {0x80000019, 0x86a3, 0x7, 0x7, 0x6}, {0x0, 0x80, 0x5, 0x8, 0x3ff}, {0xd, 0x2, 0x0, 0x8, 0xfff}, {0xc0000001, 0x7fffffff, 0xfffffffffffffff8, 0x7fffffff, 0x8}]}) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x40) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x15c}, 0x7) r2 = msgget$private(0x0, 0x1) msgctl$MSG_STAT(r2, 0xb, 0x0) 20:52:16 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) 20:52:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f00000002c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r3, 0x7f}}, 0x275) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, &(0x7f0000000240)={0x20003}) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f0000000100)) [ 202.558010][ T8136] encrypted_key: master key parameter 'defuît' is invalid 20:52:16 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x8001, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x4082) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffff9c, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x8, 0xffff}, 0x0, 0x0, &(0x7f0000000140)={0x1, 0xfff, 0x1, 0xfffffffffffffffd}, &(0x7f0000000180)=0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x4}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r2, r3, 0x0, 0x17, &(0x7f0000000080)='keyring*.mime_typeproc\x00', r4}, 0x30) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x20}) 20:52:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000002c0)={0x0, 0xfffffffffffffdd0, &(0x7f00000001c0)={&(0x7f0000000080)={0x16, r2, 0x301, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ifb0\x00'}}]}]}, 0x28}}, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0x1a, 0x4) 20:52:16 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000380)=0x4) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) 20:52:16 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:16 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0xa, 0x801, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 202.833179][ T8154] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. 20:52:16 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) [ 202.913069][ T8164] encrypted_key: insufficient parameters specified [ 202.929042][ T8162] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. 20:52:16 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0xa, 0x801, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 202.990366][ T8163] encrypted_key: master key parameter 'defuît' is invalid 20:52:16 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) 20:52:17 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:17 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0xa, 0x801, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 203.178449][ T8177] encrypted_key: master key parameter 'defuît' is invalid 20:52:17 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:17 executing program 3: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) 20:52:17 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 203.323939][ T8190] encrypted_key: insufficient parameters specified [ 203.372118][ T8189] encrypted_key: insufficient parameters specified 20:52:17 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:17 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:17 executing program 3: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) 20:52:17 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet(0xa, 0x801, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 203.463800][ T8196] encrypted_key: master key parameter 'defuît' is invalid 20:52:17 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:17 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet(0xa, 0x801, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 203.625570][ T8208] encrypted_key: master key parameter 'defuît' is invalid [ 203.676649][ T8226] encrypted_key: insufficient parameters specified [ 203.700765][ T8223] encrypted_key: insufficient parameters specified 20:52:17 executing program 3: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) 20:52:17 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) r5 = request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, r5) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:17 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:17 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:17 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet(0xa, 0x801, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 203.822815][ T8227] encrypted_key: master key parameter 'defuît' is invalid 20:52:17 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:17 executing program 3: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) [ 203.991059][ T8244] encrypted_key: master key parameter 'defuît' is invalid 20:52:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet(0xa, 0x801, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 204.041338][ T8242] encrypted_key: insufficient parameters specified 20:52:18 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:18 executing program 3: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) [ 204.124891][ T8246] encrypted_key: master key parameter 'defuît' is invalid 20:52:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet(0xa, 0x801, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:18 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 204.239979][ T8258] encrypted_key: insufficient parameters specified 20:52:18 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:18 executing program 3: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) [ 204.342288][ T8272] encrypted_key: master key parameter 'defuît' is invalid 20:52:18 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet(0xa, 0x801, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:18 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:18 executing program 3: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) [ 204.498146][ T8292] encrypted_key: master key parameter 'defuît' is invalid [ 204.547426][ T8298] encrypted_key: master key parameter 'defuît' is invalid 20:52:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:18 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 204.648748][ T8301] encrypted_key: insufficient parameters specified 20:52:18 executing program 3: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) 20:52:18 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 204.706628][ T8311] encrypted_key: master key parameter 'defuît' is invalid 20:52:18 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:18 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 204.863121][ T8312] encrypted_key: master key parameter 'defuît' is invalid 20:52:18 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 204.945951][ T8319] encrypted_key: master key parameter 'defuît' is invalid 20:52:18 executing program 3: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}, {0x0}], 0x5) [ 205.023134][ T8321] encrypted_key: insufficient parameters specified 20:52:18 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:18 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 205.083359][ T8329] encrypted_key: master key parameter 'defuît' is invalid 20:52:19 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) [ 205.180871][ T8344] encrypted_key: master key parameter 'defuît' is invalid 20:52:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:19 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:19 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 205.352886][ T8346] encrypted_key: master key parameter 'defuît' is invalid [ 205.395562][ T8360] encrypted_key: master key parameter 'defuît' is invalid 20:52:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 205.451725][ T8361] encrypted_key: master key parameter 'defuît' is invalid 20:52:19 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:19 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:19 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 205.805656][ T8371] encrypted_key: master key parameter 'defuît' is invalid 20:52:19 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 205.964164][ T8372] encrypted_key: master key parameter 'defuît' is invalid 20:52:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:19 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:20 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:20 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 206.163152][ T8381] encrypted_key: insufficient parameters specified [ 206.227974][ T8384] encrypted_key: master key parameter 'defuît' is invalid 20:52:20 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:20 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 206.394791][ T8395] encrypted_key: insufficient parameters specified 20:52:20 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) [ 206.494241][ T8396] encrypted_key: master key parameter 'defuît' is invalid 20:52:20 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:20 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 206.585970][ T8406] encrypted_key: master key parameter 'defuît' is invalid 20:52:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:20 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) [ 206.671325][ T8415] encrypted_key: insufficient parameters specified 20:52:20 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 206.767937][ T8419] encrypted_key: master key parameter 'defuît' is invalid 20:52:20 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:20 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 206.810140][ T8417] encrypted_key: insufficient parameters specified 20:52:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:20 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 206.942205][ T8433] encrypted_key: master key parameter 'defuît' is invalid 20:52:20 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 207.046187][ T8438] encrypted_key: insufficient parameters specified [ 207.059234][ T8437] encrypted_key: master key parameter 'defuît' is invalid 20:52:20 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:21 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:21 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 207.181721][ T8448] encrypted_key: insufficient parameters specified 20:52:21 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {0x0}], 0x4) 20:52:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 207.278562][ T8458] encrypted_key: master key parameter 'defuît' is invalid 20:52:21 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:21 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 207.374549][ T8460] encrypted_key: master key parameter 'defuît' is invalid [ 207.423398][ T8473] encrypted_key: master key parameter 'defuît' is invalid 20:52:21 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:21 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) [ 207.504704][ T8472] encrypted_key: master key parameter 'defuît' is invalid 20:52:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 207.553518][ T8475] encrypted_key: master key parameter 'defuît' is invalid 20:52:21 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:21 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:21 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 207.642076][ T8483] encrypted_key: master key parameter 'defuît' is invalid 20:52:21 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {0x0}], 0x2) 20:52:21 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 207.784656][ T8495] encrypted_key: master key parameter 'defuît' is invalid [ 207.854125][ T8498] encrypted_key: master key parameter 'defuît' is invalid 20:52:21 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:21 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {0x0}], 0x2) [ 207.903331][ T8494] encrypted_key: master key parameter 'defuît' is invalid 20:52:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:21 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:21 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 208.003151][ T8508] encrypted_key: master key parameter 'defuît' is invalid [ 208.072649][ T8513] encrypted_key: master key parameter 'defuît' is invalid 20:52:22 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 208.140860][ T8522] encrypted_key: master key parameter 'defuît' is invalid 20:52:22 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:22 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 208.181607][ T8523] encrypted_key: master key parameter 'defuît' is invalid 20:52:22 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {0x0}], 0x2) [ 208.321902][ T8529] encrypted_key: master key parameter 'defuît' is invalid [ 208.363456][ T8533] encrypted_key: master key parameter 'defuît' is invalid [ 208.419115][ T8542] encrypted_key: master key parameter 'defuît' is invalid 20:52:22 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:22 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:22 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:22 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:22 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {0x0}, {0x0}], 0x3) 20:52:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 208.559229][ T8548] encrypted_key: master key parameter 'defuît' is invalid [ 208.591122][ T8550] encrypted_key: master key parameter 'defuît' is invalid 20:52:22 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {0x0}, {0x0}], 0x3) 20:52:22 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 208.641143][ T8560] encrypted_key: master key parameter 'defuît' is invalid [ 208.675483][ T8564] encrypted_key: master key parameter 'defuît' is invalid 20:52:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:22 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:22 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:22 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {0x0}, {0x0}], 0x3) 20:52:22 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 208.831309][ T8572] encrypted_key: master key parameter 'defuît' is invalid [ 208.900178][ T8574] encrypted_key: master key parameter 'defuît' is invalid 20:52:22 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x0, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 208.984745][ T8581] encrypted_key: master key parameter 'defuît' is invalid 20:52:22 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x2) 20:52:22 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 209.030382][ T8589] encrypted_key: master key parameter 'defuît' is invalid 20:52:23 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 209.118259][ T8588] encrypted_key: master key parameter 'defuît' is invalid [ 209.160684][ T8597] encrypted_key: master key parameter 'defuît' is invalid 20:52:23 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:23 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:23 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x2) 20:52:23 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x0, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 209.272052][ T8603] encrypted_key: master key parameter 'defuît' is invalid 20:52:23 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 209.360353][ T8608] encrypted_key: master key parameter 'defuît' is invalid [ 209.398508][ T8616] encrypted_key: master key parameter 'defuît' is invalid 20:52:23 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:23 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x2) [ 209.430990][ T8617] encrypted_key: master key parameter 'defuît' is invalid 20:52:23 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x0, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:23 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 209.542388][ T8625] encrypted_key: master key parameter 'defuît' is invalid 20:52:23 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) [ 209.629767][ T8631] encrypted_key: master key parameter 'defuît' is invalid [ 209.690531][ T8641] encrypted_key: master key parameter 'defuît' is invalid 20:52:23 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 209.731204][ T8643] encrypted_key: master key parameter 'defuît' is invalid 20:52:23 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) 20:52:23 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:23 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 209.851817][ T8650] encrypted_key: master key parameter 'defuît' is invalid 20:52:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:23 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 209.942647][ T8658] encrypted_key: master key parameter 'defuît' is invalid [ 209.981251][ T8662] encrypted_key: master key parameter 'defuît' is invalid [ 210.069922][ T8668] encrypted_key: master key parameter 'defuît' is invalid 20:52:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:24 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) 20:52:24 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:24 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:24 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 210.231845][ T8680] encrypted_key: master key parameter 'defuît' is invalid [ 210.262095][ T8679] encrypted_key: master key parameter 'defuît' is invalid 20:52:24 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 210.300865][ T8683] encrypted_key: master key parameter 'defuît' is invalid [ 210.448568][ T8689] encrypted_key: master key parameter 'defuît' is invalid 20:52:24 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:24 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:24 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:24 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:24 executing program 3: futex(0x0, 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffff) [ 210.605189][ T8697] encrypted_key: master key parameter 'defuît' is invalid 20:52:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 210.648631][ T8695] encrypted_key: master key parameter 'defuît' is invalid [ 210.675852][ T8696] encrypted_key: master key parameter 'defuît' is invalid [ 210.703417][ T8703] encrypted_key: master key parameter 'defuît' is invalid 20:52:24 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:24 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:24 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:24 executing program 3: socket$inet(0x10, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], 0x0, 0x0, 0x5010, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="9558da36e2412ca90c3a354b3cf5f39218be11a160b767e745ce33f9a1e33adad4e2b9b53c036eb650b2b12b97fc1e5eedd2e569e993329c69810f75bfe0"], 0x0, 0x0, 0x5110, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 20:52:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 210.902247][ T8718] encrypted_key: master key parameter 'defuît' is invalid [ 210.911592][ T8712] bridge0: port 2(bridge_slave_1) entered disabled state [ 210.922314][ T8712] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.944753][ T8717] encrypted_key: master key parameter 'defuît' is invalid [ 210.961592][ T8723] encrypted_key: master key parameter 'defuît' is invalid 20:52:25 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:25 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:25 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:25 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 211.619747][ T8733] encrypted_key: master key parameter 'defuît' is invalid [ 211.650086][ T8729] encrypted_key: master key parameter 'defuît' is invalid [ 211.678774][ T8735] encrypted_key: master key parameter 'defuît' is invalid [ 211.719506][ T8734] encrypted_key: master key parameter 'defuît' is invalid [ 211.729125][ T8722] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.736250][ T8722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 211.743703][ T8722] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.750845][ T8722] bridge0: port 1(bridge_slave_0) entered forwarding state 20:52:25 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 211.856663][ T8722] device bridge0 entered promiscuous mode [ 211.910842][ T8743] encrypted_key: master key parameter 'defuît' is invalid 20:52:25 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:25 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:25 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 211.984181][ T8737] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.991483][ T8737] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.999025][ T8737] device bridge0 left promiscuous mode 20:52:26 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 212.074498][ T8753] encrypted_key: master key parameter 'defuît' is invalid [ 212.099647][ T8749] encrypted_key: master key parameter 'defuît' is invalid [ 212.117294][ T8752] encrypted_key: master key parameter 'defuît' is invalid [ 212.141364][ T8736] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.148550][ T8736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.156033][ T8736] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.163194][ T8736] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.176597][ T8756] encrypted_key: master key parameter 'defuît' is invalid [ 212.211402][ T8736] device bridge0 entered promiscuous mode 20:52:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:26 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:26 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:26 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:26 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:26 executing program 3: socket$inet(0x10, 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB], 0x0, 0x0, 0x5010, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="9558da36e2412ca90c3a354b3cf5f39218be11a160b767e745ce33f9a1e33adad4e2b9b53c036eb650b2b12b97fc1e5eedd2e569e993329c69810f75bfe0"], 0x0, 0x0, 0x5110, 0x0) syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 212.415240][ T8766] encrypted_key: master key parameter 'defuît' is invalid [ 212.429102][ T8771] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.437097][ T8771] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.458340][ T8772] encrypted_key: master key parameter 'defuît' is invalid 20:52:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:26 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 212.466869][ T8769] encrypted_key: master key parameter 'defuît' is invalid [ 212.478201][ T8774] encrypted_key: master key parameter 'defuît' is invalid [ 212.506914][ T8771] device bridge0 left promiscuous mode 20:52:26 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:26 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:26 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 212.634129][ T8785] encrypted_key: master key parameter 'defuît' is invalid [ 212.690764][ T8788] encrypted_key: master key parameter 'defuît' is invalid 20:52:26 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 212.745253][ T8786] encrypted_key: master key parameter 'defuît' is invalid [ 212.758165][ T8791] encrypted_key: master key parameter 'defuît' is invalid 20:52:26 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:26 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:26 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 212.891052][ T8796] encrypted_key: master key parameter 'defuît' is invalid [ 212.924541][ T8800] encrypted_key: master key parameter 'defuît' is invalid 20:52:26 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 212.952574][ T8778] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.956092][ T8801] encrypted_key: master key parameter 'defuît' is invalid [ 212.959784][ T8778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.959987][ T8778] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.960036][ T8778] bridge0: port 1(bridge_slave_0) entered forwarding state 20:52:26 executing program 2: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 213.016980][ T8803] encrypted_key: master key parameter 'defuît' is invalid [ 213.032135][ T8778] device bridge0 entered promiscuous mode [ 213.056407][ T8807] encrypted_key: master key parameter 'defuît' is invalid [ 213.085422][ T7891] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.145685][ T8809] encrypted_key: insufficient parameters specified 20:52:27 executing program 3: futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffff) 20:52:27 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:27 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) fcntl$dupfd(r1, 0x0, r1) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:27 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:27 executing program 2: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 213.242456][ T8819] encrypted_key: master key parameter 'defuît' is invalid [ 213.271043][ T8814] encrypted_key: master key parameter 'defuît' is invalid 20:52:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) fcntl$dupfd(r1, 0x0, r1) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) 20:52:27 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:27 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:27 executing program 3: capget(&(0x7f0000000440)={0x19980330}, 0x0) [ 213.408132][ T8829] encrypted_key: insufficient parameters specified 20:52:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) fcntl$dupfd(r1, 0x0, r1) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="0941b16af5c886552ddeecf93c809db2"}, 0x1c) [ 213.459588][ T8832] encrypted_key: master key parameter 'defuît' is invalid 20:52:27 executing program 2: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 213.536569][ T8836] encrypted_key: master key parameter 'defuît' is invalid [ 213.539394][ T8842] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) [ 213.552630][ T8837] encrypted_key: master key parameter 'defuît' is invalid 20:52:27 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, 0x0, 0x0) 20:52:27 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 213.610891][ T8845] encrypted_key: insufficient parameters specified 20:52:27 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:27 executing program 3: r0 = socket$rxrpc(0x21, 0x2, 0x2) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x188010, r0, 0x0) 20:52:27 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 213.731407][ T8847] encrypted_key: master key parameter 'defuît' is invalid [ 213.792588][ T8857] encrypted_key: master key parameter 'defuît' is invalid [ 213.822291][ T8858] encrypted_key: master key parameter 'defuît' is invalid 20:52:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, 0x0, 0x0) 20:52:27 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 213.842600][ T8862] encrypted_key: insufficient parameters specified 20:52:27 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:27 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:27 executing program 3: waitid(0x2, 0x0, 0x0, 0x80000000, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) truncate(&(0x7f0000000140)='./file0\x00', 0x4) r2 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000380)='keyring\x00', 0x8) keyctl$unlink(0x9, r0, r1) syz_open_procfs(0x0, 0x0) socket$netlink(0x10, 0x3, 0x80000000004) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000005c0), 0x84800) add_key$user(0x0, &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000500)="6cdbe7472c66c01ce9073a6881ded553df5a65560869185d62aa0d01774c9bc2e64589ca2758a12dcfbd42cb1870d2908352417cc0b8d2e11b4c8dd114e07ca73d591b345d44e573b8e2b2f5f6952e47e4300799879705be9d9b1ce57ee02c4617036071652a93", 0x67, 0xfffffffffffffff8) add_key$user(0x0, 0x0, &(0x7f0000000680)="7e346365309f211afade490af10725742961", 0x12, 0xfffffffffffffffb) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) 20:52:27 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 213.940123][ T8869] encrypted_key: master key parameter 'defuît' is invalid 20:52:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0xa, 0x801, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) connect$inet6(r2, 0x0, 0x0) [ 214.032967][ T8875] encrypted_key: insufficient parameters specified [ 214.051441][ T8873] encrypted_key: master key parameter 'defuît' is invalid 20:52:27 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:28 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 214.088347][ T8882] encrypted_key: insufficient parameters specified 20:52:28 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:28 executing program 5: getrandom(&(0x7f0000000040)=""/232, 0xffb8, 0x2) [ 214.232087][ T8892] encrypted_key: insufficient parameters specified 20:52:28 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 214.272637][ T8890] encrypted_key: master key parameter 'defuît' is invalid [ 214.300204][ T8894] encrypted_key: master key parameter 'defuît' is invalid 20:52:28 executing program 1: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:28 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:28 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:28 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1000000000003e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0xed43) r2 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000d000)) [ 214.385109][ T8899] encrypted_key: insufficient parameters specified [ 214.461426][ T8905] encrypted_key: insufficient parameters specified [ 214.507224][ T8907] encrypted_key: master key parameter 'defuît' is invalid [ 214.528768][ T8910] encrypted_key: master key parameter 'defuît' is invalid 20:52:28 executing program 3: waitid(0x2, 0x0, 0x0, 0x80000000, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) truncate(&(0x7f0000000140)='./file0\x00', 0x4) r2 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000380)='keyring\x00', 0x8) keyctl$unlink(0x9, r0, r1) syz_open_procfs(0x0, 0x0) socket$netlink(0x10, 0x3, 0x80000000004) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000005c0), 0x84800) add_key$user(0x0, &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000500)="6cdbe7472c66c01ce9073a6881ded553df5a65560869185d62aa0d01774c9bc2e64589ca2758a12dcfbd42cb1870d2908352417cc0b8d2e11b4c8dd114e07ca73d591b345d44e573b8e2b2f5f6952e47e4300799879705be9d9b1ce57ee02c4617036071652a93", 0x67, 0xfffffffffffffff8) add_key$user(0x0, 0x0, &(0x7f0000000680)="7e346365309f211afade490af10725742961", 0x12, 0xfffffffffffffffb) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) 20:52:28 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:28 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:28 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') sendfile(r1, r2, &(0x7f0000000080)=0x100000, 0x80000003) 20:52:28 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 214.733971][ T8922] encrypted_key: master key parameter 'defuît' is invalid [ 214.770722][ T8920] encrypted_key: insufficient parameters specified 20:52:28 executing program 5: waitid(0x2, 0x0, 0x0, 0x80000000, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) truncate(&(0x7f0000000140)='./file0\x00', 0x4) r2 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000380)='keyring\x00', 0x8) keyctl$unlink(0x9, r0, r1) syz_open_procfs(0x0, 0x0) socket$netlink(0x10, 0x3, 0x80000000004) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000005c0), 0x84800) add_key$user(0x0, &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000500)="6cdbe7472c66c01ce9073a6881ded553df5a65560869185d62aa0d01774c9bc2e64589ca2758a12dcfbd42cb1870d2908352417cc0b8d2e11b4c8dd114e07ca73d591b345d44e573b8e2b2f5f6952e47e4300799879705be9d9b1ce57ee02c4617036071652a93", 0x67, 0xfffffffffffffff8) add_key$user(0x0, 0x0, &(0x7f0000000680)="7e346365309f211afade490af10725742961", 0x12, 0xfffffffffffffffb) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) 20:52:28 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 214.808018][ T8929] encrypted_key: master key parameter 'defuît' is invalid [ 214.835866][ T8924] encrypted_key: insufficient parameters specified 20:52:28 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:28 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 214.941971][ T8940] encrypted_key: master key parameter 'defuît' is invalid 20:52:28 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:28 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 215.016855][ T8942] encrypted_key: insufficient parameters specified [ 215.054299][ T8944] encrypted_key: master key parameter 'defuît' is invalid [ 215.128501][ T8949] encrypted_key: insufficient parameters specified [ 215.211238][ T8951] encrypted_key: insufficient parameters specified 20:52:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0xfd8d, &(0x7f0000000200)={&(0x7f0000000a40)=@updsa={0x138, 0x1a, 0x401, 0x0, 0x0, {{@in=@dev, @in6=@ipv4={[], [], @remote}}, {@in, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 20:52:29 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 0: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000001c0)="c148ea7204f875f5ae0809e07b9dc0f7cd18d4f934d62bd51f34578524527ac08e37b97a36447f68e03a9f97b6f245d1c6b39c40fd6580f80718c211d6c59d739f39404cff0aed53c98c65009c611328a60bc82278c6ce36b1d81e89f0cc7921c7e43d4e861cac5b84fd81f139011c17cf32810799ee41b67b61f39ab224e7236528f2fbe119aaa46c7e33b86d57b05a19c548823e13", 0x0}, 0x18) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x15}) [ 215.409665][ T8956] encrypted_key: insufficient parameters specified [ 215.418923][ T8958] encrypted_key: insufficient parameters specified 20:52:29 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 215.465616][ T8962] encrypted_key: insufficient parameters specified [ 215.492943][ T8961] encrypted_key: insufficient parameters specified 20:52:29 executing program 0: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 4: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0xfd8d, &(0x7f0000000200)={&(0x7f0000000a40)=@updsa={0x138, 0x1a, 0x401, 0x0, 0x0, {{@in=@dev, @in6=@ipv4={[], [], @remote}}, {@in, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 20:52:29 executing program 3: mknod(&(0x7f00000000c0)='./file0\x00', 0x8100000001120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) fcntl$setpipe(r0, 0x407, 0x0) 20:52:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000600)) r2 = dup2(r1, r1) r3 = syz_open_pts(r2, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)={0x15}) [ 215.638829][ T8979] encrypted_key: insufficient parameters specified [ 215.673212][ T8984] encrypted_key: insufficient parameters specified [ 215.694269][ T8985] encrypted_key: insufficient parameters specified [ 215.716896][ T8983] encrypted_key: master key parameter 'defuî' is invalid 20:52:29 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x4000) 20:52:29 executing program 0: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x1, 0x0, [], [{0x0, 0x3ff, 0x20, 0x20, 0x200, 0xa5}, {0x0, 0x0, 0x0, 0xf0c, 0x6, 0x2}], [[]]}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000280)={0x0, 0x0, [], [0xc1]}) [ 215.869718][ T9002] encrypted_key: insufficient parameters specified 20:52:29 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000575000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$getownex(r0, 0x24, &(0x7f000045fff8)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 20:52:29 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 215.916947][ T9005] encrypted_key: insufficient parameters specified [ 215.938162][ T9009] encrypted_key: insufficient parameters specified [ 215.948304][ T9006] encrypted_key: insufficient parameters specified 20:52:29 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:29 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 216.069344][ T9024] encrypted_key: insufficient parameters specified 20:52:30 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:30 executing program 5: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) 20:52:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2fffffffe}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 216.128132][ T9028] encrypted_key: insufficient parameters specified [ 216.153692][ T9029] encrypted_key: insufficient parameters specified 20:52:30 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 216.213090][ T9030] encrypted_key: insufficient parameters specified [ 216.248027][ T9039] encrypted_key: master key parameter 'defuî' is invalid 20:52:30 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:30 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 216.295049][ T9043] encrypted_key: insufficient parameters specified 20:52:30 executing program 5: clone(0x2000000000003ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="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") 20:52:30 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:30 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 216.348176][ T9047] encrypted_key: insufficient parameters specified [ 216.414433][ T9055] encrypted_key: insufficient parameters specified [ 216.433784][ T9052] syz-executor.5 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 20:52:30 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x0, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:30 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 216.467331][ T9057] encrypted_key: insufficient parameters specified [ 216.489096][ T9059] encrypted_key: insufficient parameters specified 20:52:30 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:30 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 216.562322][ T9063] encrypted_key: insufficient parameters specified [ 216.599350][ T9065] encrypted_key: master key parameter '' is invalid 20:52:30 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 216.622528][ T9068] encrypted_key: insufficient parameters specified [ 216.662273][ T9071] encrypted_key: insufficient parameters specified [ 216.726853][ T9074] encrypted_key: insufficient parameters specified 20:52:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2fffffffe}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:30 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:30 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:30 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 216.989496][ T9082] encrypted_key: insufficient parameters specified [ 217.019118][ T9085] encrypted_key: insufficient parameters specified [ 217.042665][ T9086] encrypted_key: insufficient parameters specified 20:52:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket(0x1e, 0x2, 0x0) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) 20:52:31 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 217.252918][ T9101] encrypted_key: master key parameter 'defuî' is invalid [ 217.269360][ T9099] encrypted_key: insufficient parameters specified [ 217.281011][ T9098] encrypted_key: insufficient parameters specified 20:52:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2fffffffe}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:31 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 217.303987][ T9103] encrypted_key: insufficient parameters specified 20:52:31 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee"], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 217.424702][ T9114] encrypted_key: insufficient parameters specified [ 217.457309][ T9118] encrypted_key: insufficient parameters specified 20:52:31 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 217.500164][ T9120] encrypted_key: master key parameter 'defuî' is invalid [ 217.536997][ T9122] encrypted_key: master key parameter '' is invalid [ 217.572415][ T9126] encrypted_key: insufficient parameters specified [ 217.607191][ T9128] encrypted_key: insufficient parameters specified 20:52:31 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) write(r0, &(0x7f0000000100)="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", 0x7d0) 20:52:31 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 217.696019][ T9133] encrypted_key: insufficient parameters specified 20:52:31 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2fffffffe}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 217.747399][ T9140] encrypted_key: insufficient parameters specified [ 217.786718][ T9139] encrypted_key: insufficient parameters specified 20:52:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8981, 0x0) 20:52:31 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 217.815912][ T9143] encrypted_key: insufficient parameters specified 20:52:31 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="180000001900010300000000000000000100000004001100"], 0x1}}, 0x0) [ 217.952707][ T9157] encrypted_key: insufficient parameters specified [ 217.993888][ T9160] encrypted_key: master key parameter '' is invalid [ 218.024972][ T9161] encrypted_key: insufficient parameters specified 20:52:31 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:31 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 218.041367][ T9163] encrypted_key: insufficient parameters specified 20:52:31 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 218.137493][ T9172] encrypted_key: insufficient parameters specified [ 218.180139][ T9176] encrypted_key: insufficient parameters specified [ 218.192623][ T9174] encrypted_key: insufficient parameters specified 20:52:32 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 218.221770][ T9179] encrypted_key: insufficient parameters specified [ 218.273803][ T9183] encrypted_key: insufficient parameters specified 20:52:32 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="a8a5408e47e880de7f17d9d84794be56"}}}, 0x0) [ 218.490580][ T9189] encrypted_key: insufficient parameters specified [ 218.521713][ T9194] encrypted_key: master key parameter '' is invalid [ 218.529845][ T9192] encrypted_key: insufficient parameters specified 20:52:32 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000000)) [ 218.569155][ T9197] encrypted_key: insufficient parameters specified 20:52:32 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 218.645120][ T9205] encrypted_key: insufficient parameters specified 20:52:32 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 218.725709][ T9210] encrypted_key: insufficient parameters specified [ 218.737508][ T9212] encrypted_key: insufficient parameters specified [ 218.761487][ T9216] encrypted_key: insufficient parameters specified 20:52:32 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:32 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 218.831795][ T9219] encrypted_key: insufficient parameters specified [ 218.866003][ T9222] encrypted_key: insufficient parameters specified 20:52:32 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 218.934353][ T9229] encrypted_key: insufficient parameters specified [ 219.057705][ T9236] encrypted_key: insufficient parameters specified 20:52:32 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:32 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x6, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x402000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') 20:52:32 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='u'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:32 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:33 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) [ 219.147134][ T9243] encrypted_key: insufficient parameters specified 20:52:33 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 219.199043][ T9246] encrypted_key: insufficient parameters specified [ 219.219370][ T9248] encrypted_key: insufficient parameters specified 20:52:33 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:33 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:33 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) [ 219.339025][ T9261] encrypted_key: insufficient parameters specified [ 219.359511][ T9263] encrypted_key: insufficient parameters specified 20:52:33 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:33 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:33 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 219.403228][ T9268] encrypted_key: insufficient parameters specified [ 219.529437][ T9277] encrypted_key: insufficient parameters specified 20:52:33 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:33 executing program 5: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x1a5) r0 = gettid() arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) gettid() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2d9) tkill(r0, 0x1000000000016) [ 219.592772][ T9280] encrypted_key: insufficient parameters specified 20:52:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:33 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:33 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:33 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:33 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upda'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001df, 0x0) [ 219.781470][ T9295] encrypted_key: insufficient parameters specified 20:52:33 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) [ 219.821780][ T9298] encrypted_key: insufficient parameters specified 20:52:33 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:33 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:33 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:33 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:33 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 220.054546][ T9317] encrypted_key: insufficient parameters specified 20:52:34 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:34 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000200"/56], 0x38}, 0x0) 20:52:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:34 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:34 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:34 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) [ 220.239191][ T9336] encrypted_key: insufficient parameters specified 20:52:34 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) syz_execute_func(&(0x7f00000000c0)="410f01f964ff094ec3672e660f3a15dc963e46d8731266420fe2e3f20f124500c442019dcc6f") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000240)={@rand_addr="999ca17e720269107432474fb6711634"}, 0x14) getsockopt$inet_buf(r1, 0x0, 0x0, 0x0, &(0x7f0000000380)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 20:52:34 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) r3 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x10, 0x80002, 0x0) bind$netlink(r4, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r4, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r4, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8fff) 20:52:34 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) [ 220.405821][ T9354] encrypted_key: insufficient parameters specified 20:52:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:34 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:34 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:34 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:34 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:34 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:34 executing program 5: pause() syz_execute_func(&(0x7f00000005c0)="c4e379614832074a2be92c3e980f053ef3aec4a37bf0c50141e2e96922b5b5c4262fe9efef650fa34c4e0d38463da16379637902000000f2d2dec461dc570964260f77252500c4825125465454211df96300c402fd33f66efec1c1cff3496f2f36c2e54cc4a1fbe6130f2e33c3bec5c54d0f2c718f56c442319ebb70fe6581c4028192848c00000100ba1c585641564105ba16f2ae66410f3a162888c4a3f57a000e66410fd1e426660fdf53098f69609b5687a8e1c422559c2b3e660f6eb45b000880417cd8d8a1a12ad764c4213a5fc066420f383bd4643600a719ec19ec8f8878ed280140646666413a0f38b0ca30caf347af67ddea2665e94612c800f344a5d0818194d8000f092ddd8f0b00c462112cb800800000fb2e4d36646466264683ad080000000d0d34d8932e404d0fdd0edd0eccc44d4dc741afa20f6baf00c4e39978d104c0414c598374fb0a07b3ddaccd58fdedf20f1dbe0010000000e5c5f09983d60709045c8347ccb96726430f6b37f2c07f08007f08d4d2d89b4fd89b4fc4c32d68bd469b662072720f4401a9bbd8000042a1c4a1c474ecd53131fbc4a275d00831") 20:52:34 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:34 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:35 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000100)="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") 20:52:35 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:35 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:35 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:35 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:35 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:35 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:35 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:35 executing program 4: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup/syz0\x00\x89\x06\xd9\xe8{A\xac\xb6\xa1\xd3z\xbf\xf2\x8c\xa9\xf2\xd6j<\xb3\xed$\x9fm\x0f\a\b\xea_\xe6\xa4\xbd\xe8L@,Z1_\xa5\xb2\xce\xfb\xca\x9eKW\xff\xe7E\xc3\x01\x00nU\x93[4\xe1\xc8k\xce\xf2\x00\x1f\x18\xcc\\\x0e\xa5\x92-\xfa\xd6\x0f\xf4\xfd\xc0\xfe\xf9\x8c%X\x1e\x96)t\xa4\xff/\x94u\xdf\x03\xbd8\xf8Kp\x15\xc5\x0e\x8a\xcch\xf4\x01\x03}\xe4\xf2\x81\x13\xf6^\xad\v\xc8\v\xda\xa0\xbb\x81\x95\xeb\xf2\xa8\x93\x838e', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) 20:52:35 executing program 1: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f00000001c0)={'vcan0\x00', {0x2, 0x4e24, @broadcast}}) fcntl$getflags(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc872, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$unix(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) listen(r0, 0xa1) openat$vsock(0xffffffffffffff9c, 0x0, 0x1ff, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x800010b, 0x18) setrlimit(0x0, 0x0) getpid() sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) syz_open_dev$dri(&(0x7f0000000580)='/dev/dri/card#\x00', 0x0, 0x0) 20:52:35 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:36 executing program 2: 20:52:36 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x10000000000002, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = open(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) 20:52:36 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:36 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) 20:52:36 executing program 5: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0xffffffffffffffff, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x35b, 0x0) 20:52:36 executing program 1: 20:52:36 executing program 1: 20:52:36 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:36 executing program 5: 20:52:36 executing program 4: 20:52:36 executing program 2: 20:52:36 executing program 1: 20:52:36 executing program 4: 20:52:36 executing program 5: 20:52:36 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:36 executing program 2: 20:52:36 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:36 executing program 1: 20:52:36 executing program 4: 20:52:36 executing program 5: 20:52:36 executing program 2: 20:52:36 executing program 1: 20:52:36 executing program 5: 20:52:36 executing program 4: 20:52:36 executing program 0: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) 20:52:36 executing program 4: 20:52:37 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:37 executing program 1: 20:52:37 executing program 2: 20:52:37 executing program 5: 20:52:37 executing program 4: 20:52:37 executing program 0: 20:52:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f00000004c0)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x8000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:52:37 executing program 0: 20:52:37 executing program 5: 20:52:37 executing program 4: 20:52:37 executing program 1: 20:52:37 executing program 4: 20:52:37 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:37 executing program 0: 20:52:37 executing program 1: 20:52:37 executing program 5: 20:52:37 executing program 4: 20:52:37 executing program 2: 20:52:37 executing program 5: 20:52:37 executing program 4: 20:52:37 executing program 0: 20:52:37 executing program 1: 20:52:37 executing program 2: 20:52:37 executing program 0: 20:52:37 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:37 executing program 4: 20:52:37 executing program 1: 20:52:37 executing program 5: 20:52:37 executing program 2: 20:52:37 executing program 0: 20:52:37 executing program 0: 20:52:37 executing program 5: 20:52:37 executing program 2: 20:52:38 executing program 4: 20:52:38 executing program 1: 20:52:38 executing program 0: 20:52:38 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:38 executing program 2: 20:52:38 executing program 4: 20:52:38 executing program 5: 20:52:38 executing program 1: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x0) 20:52:38 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x100000011, @loopback, 0x20000000000, 0x0, 'none\x00', 0x800, 0x0, 0x23}, 0x2c) 20:52:38 executing program 2: 20:52:38 executing program 5: 20:52:38 executing program 4: 20:52:38 executing program 0: 20:52:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = io_uring_setup(0xdae, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000080)=[r0], 0x1) 20:52:38 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x100000011, @multicast2=0xe000000f, 0x0, 0x0, 'wlc\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\x00'}, 0x2c) 20:52:38 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:38 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x20002) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKZEROOUT(r1, 0x1277, 0x0) 20:52:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f317dd070") r1 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r2, &(0x7f0000001f40)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)=""/126, 0x7e}, {&(0x7f0000000240)=""/255, 0xff}, {&(0x7f00000003c0)=""/213, 0xd5}, {0x0}, {&(0x7f0000000540)=""/227, 0xe3}, {0x0}], 0x6, &(0x7f0000000740)=""/132, 0x84}, 0x6a}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000001b9, 0x0) 20:52:38 executing program 0: set_mempolicy(0x2, &(0x7f0000000140)=0x6, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x800000000105082) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x10200000e) 20:52:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000001540)="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") 20:52:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000300)=ANY=[@ANYBLOB="bc75cf6b01000080"], 0x1) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) fcntl$setstatus(r2, 0x4, 0x42803) 20:52:38 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fstatfs(r0, &(0x7f0000000180)=""/25) 20:52:38 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x100000011, @multicast2, 0x0, 0x1100, 'wlc\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe6\x00'}, 0x2c) 20:52:38 executing program 2: getpid() openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) recvmmsg(r1, &(0x7f0000006100)=[{{&(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000340)=""/120, 0x6f}}], 0x400000000000653, 0x0, 0x0) 20:52:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x7) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r3, 0x29, 0x37, 0x0, 0x0) 20:52:39 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, 0x0, 0x0) 20:52:39 executing program 5: 20:52:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:39 executing program 5: 20:52:39 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x19, &(0x7f0000000000), 0x4) 20:52:39 executing program 2: 20:52:39 executing program 1: 20:52:39 executing program 0: 20:52:39 executing program 5: 20:52:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:39 executing program 2: 20:52:39 executing program 4: 20:52:39 executing program 5: 20:52:39 executing program 0: 20:52:39 executing program 4: 20:52:39 executing program 2: r0 = getpgrp(0xffffffffffffffff) waitid(0x1, r0, 0x0, 0x2, 0x0) 20:52:39 executing program 5: 20:52:39 executing program 1: 20:52:39 executing program 4: 20:52:39 executing program 0: 20:52:39 executing program 2: 20:52:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:40 executing program 5: 20:52:40 executing program 1: 20:52:40 executing program 4: 20:52:40 executing program 2: 20:52:40 executing program 0: 20:52:40 executing program 5: 20:52:40 executing program 2: 20:52:40 executing program 4: 20:52:40 executing program 1: 20:52:40 executing program 0: 20:52:40 executing program 2: 20:52:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:40 executing program 4: 20:52:40 executing program 1: 20:52:40 executing program 5: 20:52:40 executing program 0: 20:52:40 executing program 2: 20:52:40 executing program 4: 20:52:40 executing program 0: 20:52:40 executing program 1: 20:52:40 executing program 5: 20:52:40 executing program 2: 20:52:40 executing program 1: 20:52:40 executing program 4: 20:52:40 executing program 0: 20:52:40 executing program 5: 20:52:40 executing program 2: 20:52:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:40 executing program 1: 20:52:41 executing program 0: 20:52:41 executing program 2: 20:52:41 executing program 5: 20:52:41 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) write$P9_RAUTH(r0, 0x0, 0x0) 20:52:41 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() ptrace$peekuser(0x3, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0xffffffffffffffa0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, 0x0) timer_create(0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x2f) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ftruncate(0xffffffffffffffff, 0x0) write$P9_RMKDIR(0xffffffffffffffff, 0x0, 0x0) tkill(r1, 0x1000000000016) 20:52:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca5055e0bcfec7be070") connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='veth1_to_bond\x00', 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 20:52:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000000c0)="1098ce66000000007be070") r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x8, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 20:52:41 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$int_in(r0, 0x0, 0x0) 20:52:41 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x200002, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 20:52:41 executing program 0: 20:52:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:41 executing program 4: 20:52:41 executing program 5: 20:52:41 executing program 4: 20:52:41 executing program 5: 20:52:41 executing program 0: 20:52:41 executing program 1: 20:52:41 executing program 2: 20:52:41 executing program 5: 20:52:41 executing program 0: 20:52:41 executing program 4: 20:52:41 executing program 1: 20:52:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:42 executing program 5: 20:52:42 executing program 4: r0 = getpgid(0xffffffffffffffff) waitid(0x2, r0, 0x0, 0x80000000, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="f8e83ad4c07b057e", 0x8, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) truncate(&(0x7f0000000140)='./file0\x00', 0x4) r3 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r3, 0x110, 0x1, &(0x7f0000000380)='keyring\x00', 0x8) keyctl$unlink(0x9, r1, r2) syz_open_procfs(r0, 0x0) socket$netlink(0x10, 0x3, 0x80000000004) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000005c0), 0x84800) add_key$user(0x0, &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000500)="6cdbe7472c66c01ce9073a6881ded553df5a65560869185d62aa0d01774c9bc2e64589ca2758a12dcfbd42cb1870d2908352417cc0b8d2e11b4c8dd114e07ca73d591b345d44e573b8e2b2f5f6952e47e4300799879705be9d9b1ce57ee02c4617036071652a93", 0x67, 0xfffffffffffffff8) add_key$user(0x0, 0x0, &(0x7f0000000680)="7e346365309f211afade490af10725742961df5053cc267f9567628b450806567b8d137f78ce4eb2d0a87c0f6c34b8f84d8433", 0x33, 0xfffffffffffffffb) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r5 = dup2(r4, r4) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) 20:52:42 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) 20:52:42 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) msync(&(0x7f0000ff9000/0x7000)=nil, 0x7000, 0x2) 20:52:42 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='rose0\x00', 0x10) 20:52:42 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:42 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:42 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 228.367033][ T9860] encrypted_key: master key parameter 'defuît' is invalid [ 228.441318][ T9862] encrypted_key: master key parameter 'defuît' is invalid 20:52:42 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 228.484390][ T9865] encrypted_key: master key parameter 'defuît' is invalid 20:52:42 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:42 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 228.604813][ T9869] encrypted_key: master key parameter 'defuît' is invalid [ 228.678749][ T9871] encrypted_key: master key parameter 'defuît' is invalid [ 228.737288][ T9876] encrypted_key: master key parameter 'defuît' is invalid 20:52:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:42 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:42 executing program 4: r0 = getpgid(0xffffffffffffffff) waitid(0x2, r0, 0x0, 0x80000000, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="f8e83ad4c07b057e", 0x8, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) truncate(&(0x7f0000000140)='./file0\x00', 0x4) r3 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r3, 0x110, 0x1, &(0x7f0000000380)='keyring\x00', 0x8) keyctl$unlink(0x9, r1, r2) syz_open_procfs(r0, 0x0) socket$netlink(0x10, 0x3, 0x80000000004) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000005c0), 0x84800) add_key$user(0x0, &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000500)="6cdbe7472c66c01ce9073a6881ded553df5a65560869185d62aa0d01774c9bc2e64589ca2758a12dcfbd42cb1870d2908352417cc0b8d2e11b4c8dd114e07ca73d591b345d44e573b8e2b2f5f6952e47e4300799879705be9d9b1ce57ee02c4617036071652a93", 0x67, 0xfffffffffffffff8) add_key$user(0x0, 0x0, &(0x7f0000000680)="7e346365309f211afade490af10725742961df5053cc267f9567628b450806567b8d137f78ce4eb2d0a87c0f6c34b8f84d8433", 0x33, 0xfffffffffffffffb) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r5 = dup2(r4, r4) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) 20:52:42 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:42 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:42 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 228.921709][ T9892] encrypted_key: master key parameter 'defuît' is invalid [ 228.947177][ T9888] encrypted_key: master key parameter 'defuît' is invalid [ 228.956155][ T9886] encrypted_key: master key parameter 'defuît' is invalid 20:52:42 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 228.984590][ T9890] encrypted_key: master key parameter 'defuît' is invalid 20:52:42 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:42 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:43 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 229.130574][ T9901] encrypted_key: master key parameter 'defuît' is invalid [ 229.191927][ T9905] encrypted_key: master key parameter 'defuît' is invalid [ 229.210994][ T9903] encrypted_key: master key parameter 'defuît' is invalid 20:52:43 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:43 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) [ 229.298089][ T9908] encrypted_key: master key parameter 'defuît' is invalid [ 229.478156][ T9914] encrypted_key: master key parameter 'defuît' is invalid 20:52:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:43 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:43 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:43 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) 20:52:43 executing program 4: r0 = getpgid(0xffffffffffffffff) waitid(0x2, r0, 0x0, 0x80000000, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="f8e83ad4c07b057e", 0x8, 0x0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) truncate(&(0x7f0000000140)='./file0\x00', 0x4) r3 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r3, 0x110, 0x1, &(0x7f0000000380)='keyring\x00', 0x8) keyctl$unlink(0x9, r1, r2) syz_open_procfs(r0, 0x0) socket$netlink(0x10, 0x3, 0x80000000004) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) close(0xffffffffffffffff) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000005c0), 0x84800) add_key$user(0x0, &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000500)="6cdbe7472c66c01ce9073a6881ded553df5a65560869185d62aa0d01774c9bc2e64589ca2758a12dcfbd42cb1870d2908352417cc0b8d2e11b4c8dd114e07ca73d591b345d44e573b8e2b2f5f6952e47e4300799879705be9d9b1ce57ee02c4617036071652a93", 0x67, 0xfffffffffffffff8) add_key$user(0x0, 0x0, &(0x7f0000000680)="7e346365309f211afade490af10725742961df5053cc267f9567628b450806567b8d137f78ce4eb2d0a87c0f6c34b8f84d8433", 0x33, 0xfffffffffffffffb) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r5 = dup2(r4, r4) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[]}}, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) 20:52:43 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 229.669894][ T9929] encrypted_key: master key parameter 'defuît' is invalid [ 229.705656][ T9923] encrypted_key: master key parameter 'defuît' is invalid 20:52:43 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 229.731715][ T9928] encrypted_key: master key parameter 'defuît' is invalid 20:52:43 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) 20:52:43 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:43 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 229.991435][ T9940] encrypted_key: master key parameter 'defuît' is invalid [ 230.028415][ T9943] encrypted_key: master key parameter 'defuît' is invalid 20:52:43 executing program 1: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) [ 230.052176][ T9945] encrypted_key: master key parameter 'defuît' is invalid 20:52:44 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 230.285606][ T9952] encrypted_key: master key parameter 'defuît' is invalid 20:52:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:44 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:44 executing program 1: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) 20:52:44 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:44 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:44 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:44 executing program 1: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) [ 230.460460][ T9966] encrypted_key: master key parameter 'defuît' is invalid [ 230.481978][ T9967] encrypted_key: master key parameter 'defuît' is invalid 20:52:44 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 230.508857][ T9963] encrypted_key: master key parameter 'defuît' is invalid [ 230.525091][ T9969] encrypted_key: master key parameter 'defuît' is invalid 20:52:44 executing program 1: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) 20:52:44 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:44 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:44 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 230.694223][ T9985] encrypted_key: master key parameter 'defuît' is invalid [ 230.743045][ T9984] encrypted_key: master key parameter 'defuît' is invalid [ 230.792258][ T9988] encrypted_key: master key parameter 'defuît' is invalid [ 230.827516][ T9986] encrypted_key: master key parameter 'defuît' is invalid 20:52:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:44 executing program 1: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) 20:52:44 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:44 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:44 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:44 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 231.049894][ T9996] encrypted_key: master key parameter 'defuît' is invalid [ 231.068696][ T9999] encrypted_key: master key parameter 'defuît' is invalid 20:52:45 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 231.097001][T10001] encrypted_key: master key parameter 'defuît' is invalid 20:52:45 executing program 1: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) 20:52:45 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 231.131776][T10003] encrypted_key: master key parameter 'defuît' is invalid 20:52:45 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:45 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:45 executing program 1: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) [ 231.295658][T10016] encrypted_key: master key parameter 'defuît' is invalid [ 231.328112][T10019] encrypted_key: master key parameter 'defuît' is invalid [ 231.378583][T10023] encrypted_key: master key parameter 'defuît' is invalid [ 231.425550][T10026] encrypted_key: master key parameter 'defuît' is invalid 20:52:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:45 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:45 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:45 executing program 1: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) 20:52:45 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:45 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:45 executing program 1: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) [ 231.689998][T10040] encrypted_key: master key parameter 'defuît' is invalid [ 231.729781][T10044] encrypted_key: master key parameter 'defuît' is invalid 20:52:45 executing program 1: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) [ 231.757611][T10043] encrypted_key: master key parameter 'defuît' is invalid [ 231.774501][T10045] encrypted_key: master key parameter 'defuît' is invalid 20:52:45 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:45 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:45 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:45 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 232.028204][T10063] encrypted_key: master key parameter 'defuît' is invalid [ 232.048498][T10064] encrypted_key: insufficient parameters specified [ 232.058515][T10065] encrypted_key: insufficient parameters specified 20:52:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:45 executing program 1: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) [ 232.074833][T10066] encrypted_key: insufficient parameters specified 20:52:45 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:46 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:46 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:46 executing program 4: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:46 executing program 1: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}, {0x0}], 0x3) 20:52:46 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) [ 232.336708][T10084] encrypted_key: master key parameter 'defuît' is invalid [ 232.352956][T10080] encrypted_key: master key parameter 'defuît' is invalid [ 232.375907][T10082] encrypted_key: insufficient parameters specified 20:52:46 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) [ 232.402132][T10078] encrypted_key: insufficient parameters specified 20:52:46 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:46 executing program 0: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:46 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 232.638220][T10101] encrypted_key: insufficient parameters specified [ 232.674174][T10103] encrypted_key: master key parameter 'defuît' is invalid 20:52:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:46 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:46 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:46 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:46 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 232.715714][T10106] encrypted_key: master key parameter 'defuît' is invalid 20:52:46 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) [ 232.870585][T10117] encrypted_key: master key parameter 'defuît' is invalid 20:52:46 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:46 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) [ 232.921334][T10124] encrypted_key: master key parameter 'defuît' is invalid 20:52:46 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:46 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:46 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:47 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) [ 233.160387][T10141] encrypted_key: master key parameter 'defuît' is invalid [ 233.195846][T10145] encrypted_key: master key parameter 'defuît' is invalid 20:52:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:47 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:47 executing program 4: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:47 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:47 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:47 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:47 executing program 4: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:47 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 233.486050][T10160] encrypted_key: master key parameter 'defuît' is invalid [ 233.520324][T10163] encrypted_key: master key parameter 'defuît' is invalid 20:52:47 executing program 0: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:52:47 executing program 4: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:47 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:47 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440), 0x0) [ 233.693282][T10175] encrypted_key: master key parameter 'defuît' is invalid [ 233.796149][T10187] encrypted_key: master key parameter 'defuît' is invalid 20:52:47 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440), 0x0) 20:52:47 executing program 0: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:52:47 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:47 executing program 4: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:47 executing program 0: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:52:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:47 executing program 0: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:47 executing program 4: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:47 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440), 0x0) [ 234.081638][T10200] encrypted_key: insufficient parameters specified 20:52:48 executing program 0: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:48 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757064617465206465660775ee7420757365723a6e00002000"], 0x19, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:48 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:48 executing program 4: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) [ 234.300740][T10223] encrypted_key: insufficient parameters specified [ 234.362685][T10224] encrypted_key: master key parameter 'defuît' is invalid 20:52:48 executing program 4: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:48 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:48 executing program 5: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:48 executing program 0: r0 = io_uring_setup(0x0, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:48 executing program 1: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 234.620417][T10247] encrypted_key: insufficient parameters specified 20:52:48 executing program 4: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:48 executing program 0: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) [ 234.661152][T10237] encrypted_key: insufficient parameters specified 20:52:48 executing program 2: mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x8000, 0x0) write$P9_RAUTH(r0, &(0x7f00000003c0)={0x14, 0x67, 0x2, {0xe1, 0x2, 0x1}}, 0x14) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) fstat(0xffffffffffffffff, 0x0) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000014c0)={{}, 0x0, 0x0, 0x72}) msgsnd(0x0, 0x0, 0x0, 0x0) pipe(0x0) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000440)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f0000000080)) r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x0, 0xf}, &(0x7f0000000080)='encrypted\x00', r3) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000780)={'TPROXY\x00'}, &(0x7f00000007c0)=0x1e) request_key(&(0x7f00000006c0)='id_resolver\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='update ', 0x0) r4 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x220800, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r4, &(0x7f0000000340)={0x1, 0x3ff}, 0xfe0e) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='user:', 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 234.706186][T10246] encrypted_key: insufficient parameters specified 20:52:48 executing program 0: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:48 executing program 5 (fault-call:1 fault-nth:0): r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:48 executing program 4: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:48 executing program 1 (fault-call:1 fault-nth:0): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 234.854452][T10260] encrypted_key: insufficient parameters specified 20:52:48 executing program 0: r0 = io_uring_setup(0x64, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) [ 234.916704][T10270] FAULT_INJECTION: forcing a failure. [ 234.916704][T10270] name failslab, interval 1, probability 0, space 0, times 1 [ 234.918893][T10266] FAULT_INJECTION: forcing a failure. [ 234.918893][T10266] name failslab, interval 1, probability 0, space 0, times 1 [ 234.989455][T10270] CPU: 0 PID: 10270 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #97 [ 234.997492][T10270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.007582][T10270] Call Trace: [ 235.010945][T10270] dump_stack+0x172/0x1f0 [ 235.015324][T10270] should_fail.cold+0xa/0x15 [ 235.019932][T10270] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 235.025793][T10270] ? ___might_sleep+0x163/0x280 [ 235.030677][T10270] __should_failslab+0x121/0x190 [ 235.035620][T10270] should_failslab+0x9/0x14 [ 235.040134][T10270] __kmalloc+0x2dc/0x740 [ 235.044406][T10270] ? __io_uring_register+0x733/0x2070 [ 235.049801][T10270] __io_uring_register+0x733/0x2070 [ 235.055027][T10270] ? __mutex_lock+0x3cd/0x1310 [ 235.059801][T10270] ? __x64_sys_io_uring_register+0x182/0x1f0 [ 235.065839][T10270] ? io_sq_wq_submit_work+0x10f0/0x10f0 [ 235.071412][T10270] ? fput+0x1b/0x20 [ 235.075225][T10270] ? ksys_write+0x1f1/0x2d0 [ 235.079750][T10270] __x64_sys_io_uring_register+0x193/0x1f0 [ 235.085591][T10270] do_syscall_64+0x103/0x610 [ 235.090194][T10270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.096087][T10270] RIP: 0033:0x458da9 [ 235.099985][T10270] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.119616][T10270] RSP: 002b:00007ff8415d8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 235.128039][T10270] RAX: ffffffffffffffda RBX: 00007ff8415d8c90 RCX: 0000000000458da9 [ 235.136020][T10270] RDX: 0000000020000440 RSI: 0000000000000000 RDI: 0000000000000003 [ 235.143998][T10270] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 235.152001][T10270] R10: 0000000000000001 R11: 0000000000000246 R12: 00007ff8415d96d4 [ 235.159981][T10270] R13: 00000000004cb820 R14: 00000000004d22b8 R15: 0000000000000004 [ 235.167985][T10266] CPU: 1 PID: 10266 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 235.175982][T10266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.186042][T10266] Call Trace: [ 235.186067][T10266] dump_stack+0x172/0x1f0 [ 235.186087][T10266] should_fail.cold+0xa/0x15 [ 235.186109][T10266] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 235.186127][T10266] ? ___might_sleep+0x163/0x280 [ 235.186144][T10266] __should_failslab+0x121/0x190 [ 235.186156][T10266] should_failslab+0x9/0x14 [ 235.186170][T10266] __kmalloc_track_caller+0x2d8/0x740 [ 235.186182][T10266] ? __check_object_size+0x3d/0x42f [ 235.186196][T10266] ? wait_for_completion+0x440/0x440 [ 235.186227][T10266] ? strndup_user+0x77/0xd0 [ 235.198558][T10266] memdup_user+0x26/0xb0 [ 235.198574][T10266] strndup_user+0x77/0xd0 [ 235.198615][T10266] __x64_sys_add_key+0x19d/0x4f0 [ 235.198637][T10266] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 235.259189][T10266] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 235.264660][T10266] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.270749][T10266] ? lockdep_hardirqs_on+0x418/0x5d0 [ 235.276070][T10266] ? trace_hardirqs_on+0x67/0x230 [ 235.281110][T10266] do_syscall_64+0x103/0x610 [ 235.285729][T10266] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.291636][T10266] RIP: 0033:0x458da9 [ 235.295537][T10266] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.315145][T10266] RSP: 002b:00007f324ec13c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 235.323544][T10266] RAX: ffffffffffffffda RBX: 00007f324ec13c90 RCX: 0000000000458da9 [ 235.331530][T10266] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 20:52:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:49 executing program 2 (fault-call:1 fault-nth:0): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:49 executing program 4: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:49 executing program 0: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 235.339556][T10266] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 235.347518][T10266] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ec146d4 [ 235.355474][T10266] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 [ 235.380738][T10281] FAULT_INJECTION: forcing a failure. [ 235.380738][T10281] name failslab, interval 1, probability 0, space 0, times 0 [ 235.404356][T10281] CPU: 1 PID: 10281 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #97 [ 235.412383][T10281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.422452][T10281] Call Trace: [ 235.425765][T10281] dump_stack+0x172/0x1f0 [ 235.430118][T10281] should_fail.cold+0xa/0x15 [ 235.434726][T10281] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 235.434752][T10281] ? ___might_sleep+0x163/0x280 [ 235.434776][T10281] __should_failslab+0x121/0x190 [ 235.450456][T10281] should_failslab+0x9/0x14 [ 235.454997][T10281] __kmalloc_track_caller+0x2d8/0x740 [ 235.460382][T10281] ? __check_object_size+0x3d/0x42f [ 235.460402][T10281] ? wait_for_completion+0x440/0x440 [ 235.460417][T10281] ? strndup_user+0x77/0xd0 [ 235.460440][T10281] memdup_user+0x26/0xb0 [ 235.479846][T10281] strndup_user+0x77/0xd0 [ 235.479869][T10281] __x64_sys_add_key+0x19d/0x4f0 20:52:49 executing program 5 (fault-call:1 fault-nth:1): r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1) [ 235.479889][T10281] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 235.479906][T10281] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 235.479928][T10281] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.507375][T10281] ? lockdep_hardirqs_on+0x418/0x5d0 [ 235.512670][T10281] ? trace_hardirqs_on+0x67/0x230 [ 235.517701][T10281] do_syscall_64+0x103/0x610 [ 235.522325][T10281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.528233][T10281] RIP: 0033:0x458da9 [ 235.532149][T10281] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.551932][T10281] RSP: 002b:00007fdacda2cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 235.560331][T10281] RAX: ffffffffffffffda RBX: 00007fdacda2cc90 RCX: 0000000000458da9 [ 235.568295][T10281] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 235.576276][T10281] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 235.584244][T10281] R10: 00000000000000ca R11: 0000000000000246 R12: 00007fdacda2d6d4 20:52:49 executing program 1 (fault-call:1 fault-nth:1): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 235.592206][T10281] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 [ 235.618970][T10296] FAULT_INJECTION: forcing a failure. [ 235.618970][T10296] name failslab, interval 1, probability 0, space 0, times 0 [ 235.651106][T10296] CPU: 1 PID: 10296 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 235.659137][T10296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.669792][T10296] Call Trace: [ 235.673109][T10296] dump_stack+0x172/0x1f0 [ 235.677461][T10296] should_fail.cold+0xa/0x15 [ 235.682174][T10296] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 235.688002][T10296] ? ___might_sleep+0x163/0x280 [ 235.693403][T10296] __should_failslab+0x121/0x190 [ 235.698445][T10296] should_failslab+0x9/0x14 [ 235.702969][T10296] kmem_cache_alloc_node_trace+0x270/0x720 [ 235.708797][T10296] __kmalloc_node+0x3d/0x70 [ 235.713309][T10296] kvmalloc_node+0x68/0x100 [ 235.717830][T10296] __x64_sys_add_key+0x3cd/0x4f0 [ 235.722780][T10296] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 235.729380][T10296] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 235.729399][T10296] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.729414][T10296] ? lockdep_hardirqs_on+0x418/0x5d0 [ 235.729429][T10296] ? trace_hardirqs_on+0x67/0x230 20:52:49 executing program 4: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:49 executing program 0: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:52:49 executing program 2 (fault-call:1 fault-nth:1): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 235.729446][T10296] do_syscall_64+0x103/0x610 [ 235.729463][T10296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.729474][T10296] RIP: 0033:0x458da9 [ 235.729502][T10296] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.729510][T10296] RSP: 002b:00007f324ec13c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 235.729523][T10296] RAX: ffffffffffffffda RBX: 00007f324ec13c90 RCX: 0000000000458da9 [ 235.729530][T10296] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 235.729537][T10296] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 235.729545][T10296] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ec146d4 [ 235.729561][T10296] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 [ 235.783298][T10300] FAULT_INJECTION: forcing a failure. [ 235.783298][T10300] name failslab, interval 1, probability 0, space 0, times 0 [ 235.891624][T10300] CPU: 1 PID: 10300 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #97 [ 235.899662][T10300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.909728][T10300] Call Trace: [ 235.913042][T10300] dump_stack+0x172/0x1f0 [ 235.917403][T10300] should_fail.cold+0xa/0x15 [ 235.922010][T10300] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 235.927832][T10300] ? ___might_sleep+0x163/0x280 [ 235.932711][T10300] __should_failslab+0x121/0x190 [ 235.937851][T10300] should_failslab+0x9/0x14 [ 235.942370][T10300] kmem_cache_alloc_node_trace+0x270/0x720 [ 235.948193][T10300] __kmalloc_node+0x3d/0x70 [ 235.952890][T10300] kvmalloc_node+0x68/0x100 [ 235.957412][T10300] __x64_sys_add_key+0x3cd/0x4f0 [ 235.962366][T10300] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 235.968972][T10300] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 235.974442][T10300] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.980544][T10300] ? lockdep_hardirqs_on+0x418/0x5d0 [ 235.985850][T10300] ? trace_hardirqs_on+0x67/0x230 [ 235.991245][T10300] do_syscall_64+0x103/0x610 [ 235.995878][T10300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.001785][T10300] RIP: 0033:0x458da9 [ 236.005708][T10300] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.025701][T10300] RSP: 002b:00007fdacda2cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 236.034219][T10300] RAX: ffffffffffffffda RBX: 00007fdacda2cc90 RCX: 0000000000458da9 20:52:49 executing program 4: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) 20:52:49 executing program 0: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:52:49 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1) [ 236.042223][T10300] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 236.050231][T10300] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 236.058313][T10300] R10: 00000000000000ca R11: 0000000000000246 R12: 00007fdacda2d6d4 [ 236.066298][T10300] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 20:52:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:50 executing program 2 (fault-call:1 fault-nth:2): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:50 executing program 1 (fault-call:1 fault-nth:2): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:50 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:50 executing program 0: io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}, {&(0x7f0000000280)=""/209, 0xd1}], 0x4) [ 236.214361][T10321] FAULT_INJECTION: forcing a failure. [ 236.214361][T10321] name failslab, interval 1, probability 0, space 0, times 0 [ 236.240204][T10324] FAULT_INJECTION: forcing a failure. [ 236.240204][T10324] name failslab, interval 1, probability 0, space 0, times 0 20:52:50 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x2, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 236.331221][T10324] CPU: 1 PID: 10324 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 236.339299][T10324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.349380][T10324] Call Trace: [ 236.352717][T10324] dump_stack+0x172/0x1f0 [ 236.357085][T10324] should_fail.cold+0xa/0x15 [ 236.361736][T10324] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 236.367600][T10324] ? ___might_sleep+0x163/0x280 [ 236.372680][T10324] __should_failslab+0x121/0x190 [ 236.377755][T10324] should_failslab+0x9/0x14 [ 236.382462][T10324] kmem_cache_alloc+0x2b2/0x6f0 [ 236.387560][T10324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.394858][T10324] ? __validate_process_creds+0x22d/0x380 [ 236.401164][T10324] prepare_creds+0x3e/0x3f0 [ 236.405861][T10324] lookup_user_key+0x6af/0x1160 [ 236.410816][T10324] ? join_session_keyring+0x340/0x340 [ 236.417368][T10324] ? lock_downgrade+0x880/0x880 [ 236.422598][T10324] ? key_validate+0x100/0x100 [ 236.427805][T10324] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.434259][T10324] ? _copy_from_user+0xdd/0x150 [ 236.439361][T10324] __x64_sys_add_key+0x272/0x4f0 [ 236.444608][T10324] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 236.451452][T10324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 236.457160][T10324] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.463471][T10324] ? lockdep_hardirqs_on+0x418/0x5d0 [ 236.468970][T10324] ? trace_hardirqs_on+0x67/0x230 [ 236.474077][T10324] do_syscall_64+0x103/0x610 [ 236.478873][T10324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.484964][T10324] RIP: 0033:0x458da9 [ 236.489047][T10324] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.509460][T10324] RSP: 002b:00007f324ec13c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 236.518242][T10324] RAX: ffffffffffffffda RBX: 00007f324ec13c90 RCX: 0000000000458da9 [ 236.529407][T10324] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 236.537630][T10324] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 236.545767][T10324] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ec146d4 [ 236.554006][T10324] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 [ 236.572471][T10321] CPU: 0 PID: 10321 Comm: syz-executor.2 Not tainted 5.1.0-rc7+ #97 [ 236.580615][T10321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.590741][T10321] Call Trace: [ 236.594154][T10321] dump_stack+0x172/0x1f0 [ 236.598757][T10321] should_fail.cold+0xa/0x15 [ 236.603618][T10321] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 236.609706][T10321] ? ___might_sleep+0x163/0x280 [ 236.615057][T10321] __should_failslab+0x121/0x190 [ 236.620135][T10321] should_failslab+0x9/0x14 [ 236.624794][T10321] kmem_cache_alloc+0x2b2/0x6f0 20:52:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:50 executing program 1 (fault-call:1 fault-nth:3): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 236.629809][T10321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 236.636262][T10321] ? __validate_process_creds+0x22d/0x380 [ 236.642041][T10321] prepare_creds+0x3e/0x3f0 [ 236.646564][T10321] lookup_user_key+0x6af/0x1160 [ 236.651464][T10321] ? join_session_keyring+0x340/0x340 [ 236.656858][T10321] ? lock_downgrade+0x880/0x880 [ 236.661738][T10321] ? key_validate+0x100/0x100 [ 236.666461][T10321] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.672737][T10321] ? _copy_from_user+0xdd/0x150 [ 236.677617][T10321] __x64_sys_add_key+0x272/0x4f0 [ 236.684761][T10321] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 236.692443][T10321] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 236.693014][T10338] FAULT_INJECTION: forcing a failure. [ 236.693014][T10338] name failslab, interval 1, probability 0, space 0, times 0 [ 236.698025][T10321] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.698054][T10321] ? lockdep_hardirqs_on+0x418/0x5d0 [ 236.698072][T10321] ? trace_hardirqs_on+0x67/0x230 [ 236.698102][T10321] do_syscall_64+0x103/0x610 20:52:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 236.698121][T10321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.698133][T10321] RIP: 0033:0x458da9 [ 236.698155][T10321] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.762311][T10321] RSP: 002b:00007fdacda2cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 236.770742][T10321] RAX: ffffffffffffffda RBX: 00007fdacda2cc90 RCX: 0000000000458da9 20:52:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 236.778734][T10321] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 236.786720][T10321] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 236.794708][T10321] R10: 00000000000000ca R11: 0000000000000246 R12: 00007fdacda2d6d4 [ 236.803868][T10321] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 [ 236.811972][T10338] CPU: 1 PID: 10338 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 236.819974][T10338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.819980][T10338] Call Trace: [ 236.820005][T10338] dump_stack+0x172/0x1f0 [ 236.820031][T10338] should_fail.cold+0xa/0x15 [ 236.820066][T10338] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 236.848318][T10338] ? ___might_sleep+0x163/0x280 [ 236.853217][T10338] __should_failslab+0x121/0x190 [ 236.858174][T10338] should_failslab+0x9/0x14 [ 236.862718][T10338] __kmalloc+0x2dc/0x740 [ 236.866983][T10338] ? refcount_inc_not_zero_checked+0x144/0x200 [ 236.873157][T10338] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 236.873187][T10338] ? security_prepare_creds+0x123/0x190 [ 236.873276][T10338] security_prepare_creds+0x123/0x190 [ 236.890302][T10338] prepare_creds+0x2f5/0x3f0 [ 236.890325][T10338] lookup_user_key+0x6af/0x1160 [ 236.890344][T10338] ? join_session_keyring+0x340/0x340 [ 236.890359][T10338] ? lock_downgrade+0x880/0x880 [ 236.890374][T10338] ? key_validate+0x100/0x100 [ 236.890398][T10338] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 236.890411][T10338] ? _copy_from_user+0xdd/0x150 [ 236.890429][T10338] __x64_sys_add_key+0x272/0x4f0 20:52:50 executing program 0 (fault-call:1 fault-nth:0): r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 236.890448][T10338] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 236.890470][T10338] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 236.905286][T10338] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.905307][T10338] ? lockdep_hardirqs_on+0x418/0x5d0 [ 236.905324][T10338] ? trace_hardirqs_on+0x67/0x230 [ 236.905358][T10338] do_syscall_64+0x103/0x610 [ 236.914972][T10338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.914985][T10338] RIP: 0033:0x458da9 [ 236.915002][T10338] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.915009][T10338] RSP: 002b:00007f324ec13c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 236.915030][T10338] RAX: ffffffffffffffda RBX: 00007f324ec13c90 RCX: 0000000000458da9 [ 236.931132][T10338] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 236.931153][T10338] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 236.931162][T10338] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ec146d4 [ 236.931170][T10338] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 20:52:50 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:50 executing program 1 (fault-call:1 fault-nth:4): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:50 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:51 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x3, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:51 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) [ 237.163122][T10353] FAULT_INJECTION: forcing a failure. [ 237.163122][T10353] name failslab, interval 1, probability 0, space 0, times 0 [ 237.226472][T10361] encrypted_key: master key parameter '' is invalid [ 237.245790][T10353] CPU: 1 PID: 10353 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 237.253822][T10353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.263888][T10353] Call Trace: [ 237.267201][T10353] dump_stack+0x172/0x1f0 [ 237.271551][T10353] should_fail.cold+0xa/0x15 [ 237.276157][T10353] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 237.281978][T10353] ? ___might_sleep+0x163/0x280 [ 237.286855][T10353] __should_failslab+0x121/0x190 [ 237.291828][T10353] should_failslab+0x9/0x14 [ 237.296356][T10353] kmem_cache_alloc+0x2b2/0x6f0 [ 237.301234][T10353] ? kasan_check_read+0x11/0x20 [ 237.306103][T10353] ? do_raw_spin_unlock+0x57/0x270 [ 237.311229][T10353] key_alloc+0x428/0x1140 [ 237.315574][T10353] ? refcount_inc_not_zero_checked+0x144/0x200 [ 237.321753][T10353] ? key_user_put+0x70/0x70 [ 237.326284][T10353] ? refcount_inc_checked+0x2b/0x70 [ 237.331532][T10353] ? apparmor_cred_prepare+0x2c3/0x550 [ 237.337010][T10353] keyring_alloc+0x4d/0xc0 [ 237.341446][T10353] install_process_keyring_to_cred.part.0+0x87/0x100 [ 237.348152][T10353] lookup_user_key+0x6ee/0x1160 [ 237.353034][T10353] ? join_session_keyring+0x340/0x340 [ 237.358429][T10353] ? lock_downgrade+0x880/0x880 [ 237.363298][T10353] ? key_validate+0x100/0x100 [ 237.368000][T10353] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 237.374252][T10353] ? _copy_from_user+0xdd/0x150 [ 237.379130][T10353] __x64_sys_add_key+0x272/0x4f0 [ 237.384088][T10353] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 237.390687][T10353] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 237.396166][T10353] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.402255][T10353] ? lockdep_hardirqs_on+0x418/0x5d0 [ 237.407563][T10353] ? trace_hardirqs_on+0x67/0x230 [ 237.412626][T10353] do_syscall_64+0x103/0x610 [ 237.412649][T10353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.412661][T10353] RIP: 0033:0x458da9 20:52:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:51 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='\nncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 237.412677][T10353] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.412686][T10353] RSP: 002b:00007f324ec13c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 237.412700][T10353] RAX: ffffffffffffffda RBX: 00007f324ec13c90 RCX: 0000000000458da9 [ 237.412709][T10353] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 237.412724][T10353] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 237.446942][T10353] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ec146d4 [ 237.446952][T10353] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 20:52:51 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='%ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:51 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:52:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:51 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x2, 0x0, 0x0) 20:52:51 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='.ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:51 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x300, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:51 executing program 1 (fault-call:1 fault-nth:5): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:51 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}, {&(0x7f00000001c0)=""/137, 0x89}], 0x3) 20:52:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) 20:52:51 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='e\ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:51 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x3, 0x0, 0x0) 20:52:51 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x4000, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) 20:52:51 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) [ 237.864307][T10400] FAULT_INJECTION: forcing a failure. [ 237.864307][T10400] name failslab, interval 1, probability 0, space 0, times 0 [ 237.929987][T10400] CPU: 1 PID: 10400 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 237.938012][T10400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.948074][T10400] Call Trace: [ 237.951383][T10400] dump_stack+0x172/0x1f0 [ 237.955741][T10400] should_fail.cold+0xa/0x15 [ 237.960351][T10400] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 237.966176][T10400] ? ___might_sleep+0x163/0x280 [ 237.971042][T10400] __should_failslab+0x121/0x190 [ 237.975986][T10400] should_failslab+0x9/0x14 [ 237.980500][T10400] __kmalloc_track_caller+0x2d8/0x740 [ 237.980519][T10400] ? rcu_read_lock_sched_held+0x110/0x130 [ 237.980533][T10400] ? kmem_cache_alloc+0x32e/0x6f0 [ 237.980548][T10400] ? key_alloc+0x481/0x1140 [ 237.980570][T10400] kmemdup+0x27/0x60 [ 237.980585][T10400] key_alloc+0x481/0x1140 [ 237.980600][T10400] ? refcount_inc_not_zero_checked+0x144/0x200 [ 237.980624][T10400] ? key_user_put+0x70/0x70 [ 237.980637][T10400] ? refcount_inc_checked+0x2b/0x70 20:52:51 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='e%crypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 237.980654][T10400] ? apparmor_cred_prepare+0x2c3/0x550 [ 237.980674][T10400] keyring_alloc+0x4d/0xc0 [ 238.035276][T10400] install_process_keyring_to_cred.part.0+0x87/0x100 [ 238.041973][T10400] lookup_user_key+0x6ee/0x1160 [ 238.047106][T10400] ? join_session_keyring+0x340/0x340 [ 238.052500][T10400] ? lock_downgrade+0x880/0x880 [ 238.057364][T10400] ? key_validate+0x100/0x100 [ 238.062242][T10400] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.068524][T10400] ? _copy_from_user+0xdd/0x150 [ 238.073388][T10400] __x64_sys_add_key+0x272/0x4f0 20:52:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) [ 238.078341][T10400] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 238.084940][T10400] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 238.090415][T10400] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.096505][T10400] ? lockdep_hardirqs_on+0x418/0x5d0 [ 238.101813][T10400] ? trace_hardirqs_on+0x67/0x230 [ 238.106941][T10400] do_syscall_64+0x103/0x610 [ 238.106965][T10400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.106977][T10400] RIP: 0033:0x458da9 [ 238.106993][T10400] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.107002][T10400] RSP: 002b:00007f324ec13c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 238.107015][T10400] RAX: ffffffffffffffda RBX: 00007f324ec13c90 RCX: 0000000000458da9 [ 238.107023][T10400] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 238.107031][T10400] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 20:52:52 executing program 1 (fault-call:1 fault-nth:6): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00'}) 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en\nrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 238.107039][T10400] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ec146d4 [ 238.107047][T10400] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 20:52:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00'}) [ 238.234695][T10423] FAULT_INJECTION: forcing a failure. [ 238.234695][T10423] name failslab, interval 1, probability 0, space 0, times 0 20:52:52 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}], 0x1) 20:52:52 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x300, 0x0, 0x0) 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en#rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:52 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xff03, &(0x7f0000000440)=[{0x0}], 0x1) [ 238.369260][T10423] CPU: 1 PID: 10423 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 238.377298][T10423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.387381][T10423] Call Trace: [ 238.390778][T10423] dump_stack+0x172/0x1f0 [ 238.395394][T10423] should_fail.cold+0xa/0x15 [ 238.400011][T10423] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 238.405843][T10423] ? ___might_sleep+0x163/0x280 [ 238.410706][T10423] __should_failslab+0x121/0x190 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en%rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 238.415656][T10423] should_failslab+0x9/0x14 [ 238.420175][T10423] kmem_cache_alloc_trace+0x2d1/0x760 [ 238.425563][T10423] ? __lock_acquire+0x548/0x3fb0 [ 238.430521][T10423] ? __lock_acquire+0x548/0x3fb0 [ 238.435566][T10423] ? _raw_write_unlock+0x2d/0x50 [ 238.440527][T10423] assoc_array_insert+0xef/0x2d90 [ 238.445574][T10423] ? mark_held_locks+0xf0/0xf0 [ 238.450348][T10423] ? mark_held_locks+0xf0/0xf0 [ 238.455120][T10423] ? key_instantiate_and_link+0x357/0x470 [ 238.460857][T10423] ? assoc_array_cancel_edit+0x90/0x90 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en*rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 238.466334][T10423] ? lock_acquire+0x16f/0x3f0 [ 238.466370][T10423] ? __key_link_begin+0x9d/0x300 [ 238.466396][T10423] __key_link_begin+0x12d/0x300 [ 238.466416][T10423] key_create_or_update+0x3a1/0xba0 [ 238.476023][T10423] ? key_type_lookup+0xf0/0xf0 [ 238.476048][T10423] ? lock_downgrade+0x880/0x880 [ 238.476078][T10423] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.476098][T10423] __x64_sys_add_key+0x2bd/0x4f0 [ 238.476120][T10423] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 238.513496][T10423] ? trace_hardirqs_on_thunk+0x1a/0x1c 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en+rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 238.518970][T10423] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.525053][T10423] ? lockdep_hardirqs_on+0x418/0x5d0 [ 238.530349][T10423] ? trace_hardirqs_on+0x67/0x230 [ 238.535393][T10423] do_syscall_64+0x103/0x610 [ 238.540012][T10423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.545911][T10423] RIP: 0033:0x458da9 [ 238.549888][T10423] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:52:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00'}) [ 238.569592][T10423] RSP: 002b:00007f324ec13c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 238.578019][T10423] RAX: ffffffffffffffda RBX: 00007f324ec13c90 RCX: 0000000000458da9 [ 238.586007][T10423] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 238.594005][T10423] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 238.602019][T10423] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ec146d4 [ 238.610009][T10423] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 20:52:52 executing program 1 (fault-call:1 fault-nth:7): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en-rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:52 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}], 0x1) 20:52:52 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x4000, 0x0, 0x0) 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en.rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 238.734286][T10457] FAULT_INJECTION: forcing a failure. [ 238.734286][T10457] name failslab, interval 1, probability 0, space 0, times 0 20:52:52 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x1000000, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:52 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x3, 0x0, 0x0) 20:52:52 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x2000000, &(0x7f0000000440)=[{0x0}], 0x1) [ 238.866660][T10457] CPU: 0 PID: 10457 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 238.874709][T10457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.884779][T10457] Call Trace: [ 238.888089][T10457] dump_stack+0x172/0x1f0 [ 238.892442][T10457] should_fail.cold+0xa/0x15 [ 238.897064][T10457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 238.902886][T10457] ? ___might_sleep+0x163/0x280 [ 238.907750][T10457] __should_failslab+0x121/0x190 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en0rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enXrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 238.912715][T10457] should_failslab+0x9/0x14 [ 238.917323][T10457] kmem_cache_alloc_trace+0x2d1/0x760 [ 238.922708][T10457] ? __lock_acquire+0x548/0x3fb0 [ 238.927656][T10457] ? __lock_acquire+0x548/0x3fb0 [ 238.932615][T10457] assoc_array_insert+0x78c/0x2d90 [ 238.937742][T10457] ? mark_held_locks+0xf0/0xf0 [ 238.942530][T10457] ? mark_held_locks+0xf0/0xf0 [ 238.947305][T10457] ? key_instantiate_and_link+0x357/0x470 [ 238.953039][T10457] ? assoc_array_cancel_edit+0x90/0x90 [ 238.958513][T10457] ? lock_acquire+0x16f/0x3f0 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='endrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 238.963198][T10457] ? __key_link_begin+0x9d/0x300 [ 238.968155][T10457] __key_link_begin+0x12d/0x300 [ 238.973020][T10457] key_create_or_update+0x3a1/0xba0 [ 238.978234][T10457] ? key_type_lookup+0xf0/0xf0 [ 238.983024][T10457] ? lock_downgrade+0x880/0x880 [ 238.987894][T10457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 238.994151][T10457] __x64_sys_add_key+0x2bd/0x4f0 [ 238.999103][T10457] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 239.005710][T10457] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 239.011217][T10457] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:52:52 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enirypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 239.017298][T10457] ? lockdep_hardirqs_on+0x418/0x5d0 [ 239.022603][T10457] ? trace_hardirqs_on+0x67/0x230 [ 239.027638][T10457] do_syscall_64+0x103/0x610 [ 239.032247][T10457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.038144][T10457] RIP: 0033:0x458da9 [ 239.038161][T10457] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.038169][T10457] RSP: 002b:00007f324ec13c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 239.038185][T10457] RAX: ffffffffffffffda RBX: 00007f324ec13c90 RCX: 0000000000458da9 [ 239.038193][T10457] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 239.038209][T10457] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 239.061965][T10457] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ec146d4 [ 239.061974][T10457] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 20:52:53 executing program 1 (fault-call:1 fault-nth:8): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:53 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enlrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:53 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}], 0x1) 20:52:53 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x1000000, 0x0, 0x0) 20:52:53 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x3000000, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:53 executing program 3: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x3, &(0x7f0000000440)=[{0x0}], 0x1) [ 239.234430][T10490] FAULT_INJECTION: forcing a failure. [ 239.234430][T10490] name failslab, interval 1, probability 0, space 0, times 0 [ 239.302537][T10490] CPU: 1 PID: 10490 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 239.310577][T10490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.320647][T10490] Call Trace: [ 239.323958][T10490] dump_stack+0x172/0x1f0 [ 239.328319][T10490] should_fail.cold+0xa/0x15 [ 239.332941][T10490] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 239.338770][T10490] ? ___might_sleep+0x163/0x280 [ 239.343635][T10490] __should_failslab+0x121/0x190 20:52:53 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enorypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:53 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enprypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 239.348581][T10490] should_failslab+0x9/0x14 [ 239.353105][T10490] kmem_cache_alloc+0x2b2/0x6f0 [ 239.357970][T10490] ? kasan_check_read+0x11/0x20 [ 239.357989][T10490] ? do_raw_spin_unlock+0x57/0x270 [ 239.358010][T10490] key_alloc+0x428/0x1140 [ 239.358035][T10490] ? key_user_put+0x70/0x70 [ 239.358058][T10490] key_create_or_update+0x5f6/0xba0 [ 239.358078][T10490] ? key_type_lookup+0xf0/0xf0 [ 239.358099][T10490] ? lock_downgrade+0x880/0x880 [ 239.358126][T10490] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 20:52:53 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='ensrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 239.368079][T10490] __x64_sys_add_key+0x2bd/0x4f0 [ 239.368101][T10490] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 239.368119][T10490] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 239.368136][T10490] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.368151][T10490] ? lockdep_hardirqs_on+0x418/0x5d0 [ 239.368167][T10490] ? trace_hardirqs_on+0x67/0x230 [ 239.368186][T10490] do_syscall_64+0x103/0x610 [ 239.368206][T10490] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.436519][T10490] RIP: 0033:0x458da9 [ 239.436537][T10490] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.436545][T10490] RSP: 002b:00007f324ec13c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 239.436561][T10490] RAX: ffffffffffffffda RBX: 00007f324ec13c90 RCX: 0000000000458da9 [ 239.436570][T10490] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 239.436578][T10490] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 20:52:53 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enurypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:53 executing program 1 (fault-call:1 fault-nth:9): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:53 executing program 3 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:53 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enxrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 239.436586][T10490] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ec146d4 [ 239.436595][T10490] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 [ 239.527396][T10510] FAULT_INJECTION: forcing a failure. [ 239.527396][T10510] name failslab, interval 1, probability 0, space 0, times 0 [ 239.594433][T10510] CPU: 1 PID: 10510 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #97 [ 239.602497][T10510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.612569][T10510] Call Trace: [ 239.615880][T10510] dump_stack+0x172/0x1f0 [ 239.620232][T10510] should_fail.cold+0xa/0x15 [ 239.624853][T10510] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 239.630712][T10510] ? br_get_link_af_size_filtered+0x13c/0xa00 [ 239.636798][T10510] ? find_held_lock+0x35/0x130 [ 239.641570][T10510] __should_failslab+0x121/0x190 [ 239.646042][T10515] FAULT_INJECTION: forcing a failure. [ 239.646042][T10515] name failslab, interval 1, probability 0, space 0, times 0 [ 239.646536][T10510] should_failslab+0x9/0x14 [ 239.646554][T10510] kmem_cache_alloc_node+0x56/0x710 [ 239.646608][T10510] __alloc_skb+0xd5/0x5e0 [ 239.646630][T10510] ? skb_trim+0x190/0x190 [ 239.678068][T10510] ? if_nlmsg_size+0x4b8/0xa00 [ 239.682849][T10510] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 239.688149][T10510] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 239.693621][T10510] rtmsg_ifinfo+0x8d/0xa0 [ 239.697962][T10510] __dev_notify_flags+0x235/0x2c0 [ 239.703000][T10510] ? dev_change_name+0xa70/0xa70 [ 239.707939][T10510] ? __dev_change_flags+0x513/0x6e0 [ 239.713145][T10510] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.719397][T10510] ? dev_set_allmulti+0x30/0x30 [ 239.724265][T10510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.730540][T10510] dev_change_flags+0x10d/0x170 [ 239.735428][T10510] devinet_ioctl+0xde6/0x1cf0 [ 239.740141][T10510] inet_ioctl+0x2d4/0x410 20:52:53 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enc\nypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 239.744572][T10510] ? inet_stream_connect+0xa0/0xa0 [ 239.749722][T10510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.755978][T10510] ? _parse_integer+0x139/0x190 [ 239.760846][T10510] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.767095][T10510] ? _kstrtoull+0x14c/0x200 [ 239.771617][T10510] sock_do_ioctl+0xde/0x300 [ 239.776138][T10510] ? compat_ifr_data_ioctl+0x160/0x160 [ 239.781607][T10510] ? tomoyo_domain+0xc5/0x160 [ 239.786298][T10510] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 239.786314][T10510] ? tomoyo_init_request_info+0x105/0x1d0 [ 239.786328][T10510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.786341][T10510] ? tomoyo_path_number_perm+0x263/0x520 [ 239.786361][T10510] sock_ioctl+0x32b/0x610 [ 239.786376][T10510] ? dlci_ioctl_set+0x40/0x40 [ 239.786411][T10510] ? __fget+0x35a/0x550 [ 239.786431][T10510] ? dlci_ioctl_set+0x40/0x40 [ 239.828718][T10510] do_vfs_ioctl+0xd6e/0x1390 [ 239.833332][T10510] ? ioctl_preallocate+0x210/0x210 [ 239.838465][T10510] ? __fget+0x381/0x550 [ 239.842653][T10510] ? ksys_dup3+0x3e0/0x3e0 [ 239.847112][T10510] ? tomoyo_file_ioctl+0x23/0x30 [ 239.852055][T10510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 239.858311][T10510] ? security_file_ioctl+0x93/0xc0 [ 239.863434][T10510] ksys_ioctl+0xab/0xd0 [ 239.867688][T10510] __x64_sys_ioctl+0x73/0xb0 [ 239.872311][T10510] do_syscall_64+0x103/0x610 [ 239.876918][T10510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.882820][T10510] RIP: 0033:0x458da9 [ 239.886729][T10510] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.906342][T10510] RSP: 002b:00007ff8fad5ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 239.914766][T10510] RAX: ffffffffffffffda RBX: 00007ff8fad5ec90 RCX: 0000000000458da9 [ 239.922739][T10510] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000004 [ 239.930714][T10510] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 239.938690][T10510] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fad5f6d4 [ 239.946665][T10510] R13: 00000000004c4635 R14: 00000000004d7ec8 R15: 0000000000000005 [ 239.954663][T10515] CPU: 0 PID: 10515 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 239.962661][T10515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.972802][T10515] Call Trace: [ 239.976108][T10515] dump_stack+0x172/0x1f0 [ 239.980448][T10515] should_fail.cold+0xa/0x15 [ 239.985142][T10515] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 239.991072][T10515] ? ___might_sleep+0x163/0x280 [ 239.995947][T10515] __should_failslab+0x121/0x190 [ 240.000885][T10515] should_failslab+0x9/0x14 [ 240.005392][T10515] __kmalloc_track_caller+0x2d8/0x740 [ 240.010766][T10515] ? rcu_read_lock_sched_held+0x110/0x130 [ 240.016501][T10515] ? kmem_cache_alloc+0x32e/0x6f0 [ 240.021530][T10515] ? key_alloc+0x481/0x1140 [ 240.026038][T10515] kmemdup+0x27/0x60 [ 240.029937][T10515] key_alloc+0x481/0x1140 [ 240.034278][T10515] ? key_user_put+0x70/0x70 [ 240.038796][T10515] key_create_or_update+0x5f6/0xba0 [ 240.044018][T10515] ? key_type_lookup+0xf0/0xf0 [ 240.048797][T10515] ? lock_downgrade+0x880/0x880 [ 240.053677][T10515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 240.060014][T10515] __x64_sys_add_key+0x2bd/0x4f0 [ 240.064961][T10515] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 240.071548][T10515] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 240.077012][T10515] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.083172][T10515] ? lockdep_hardirqs_on+0x418/0x5d0 [ 240.088461][T10515] ? trace_hardirqs_on+0x67/0x230 [ 240.093509][T10515] do_syscall_64+0x103/0x610 [ 240.098112][T10515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.104011][T10515] RIP: 0033:0x458da9 [ 240.107905][T10515] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.127525][T10515] RSP: 002b:00007f324ebf2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 240.135953][T10515] RAX: ffffffffffffffda RBX: 00007f324ebf2c90 RCX: 0000000000458da9 20:52:54 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {0x0}], 0x2) 20:52:54 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x2000000, 0x0, 0x0) 20:52:54 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enc%ypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:54 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x40000000, &(0x7f0000000440)=[{0x0}], 0x1) [ 240.144101][T10515] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 240.152070][T10515] RBP: 000000000073bfa0 R08: fffffffffffffffe R09: 0000000000000000 [ 240.160039][T10515] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ebf36d4 [ 240.168010][T10515] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 20:52:54 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encr\npted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:54 executing program 3 (fault-call:4 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:54 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {0x0}], 0x2) 20:52:54 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encr%pted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:54 executing program 1 (fault-call:1 fault-nth:10): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:54 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xff030000, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:54 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x3000000, 0x0, 0x0) [ 240.402957][T10548] FAULT_INJECTION: forcing a failure. [ 240.402957][T10548] name failslab, interval 1, probability 0, space 0, times 0 [ 240.450794][T10548] CPU: 1 PID: 10548 Comm: syz-executor.1 Not tainted 5.1.0-rc7+ #97 [ 240.458836][T10548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.468908][T10548] Call Trace: [ 240.472284][T10548] dump_stack+0x172/0x1f0 [ 240.476639][T10548] should_fail.cold+0xa/0x15 [ 240.481249][T10548] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 240.487080][T10548] ? ___might_sleep+0x163/0x280 [ 240.491949][T10548] __should_failslab+0x121/0x190 [ 240.496930][T10548] should_failslab+0x9/0x14 [ 240.501468][T10548] __kmalloc+0x2dc/0x740 [ 240.505749][T10548] ? lock_acquire+0x16f/0x3f0 [ 240.510450][T10548] ? __key_instantiate_and_link+0x3c/0x3b0 [ 240.510465][T10548] ? encrypted_instantiate+0x157/0x947 [ 240.510481][T10548] encrypted_instantiate+0x157/0x947 [ 240.510512][T10548] ? __mutex_lock+0x3cd/0x1310 [ 240.510529][T10548] ? datablob_hmac_verify+0x310/0x310 [ 240.510546][T10548] ? mutex_trylock+0x1e0/0x1e0 [ 240.510561][T10548] ? do_raw_spin_unlock+0x57/0x270 20:52:54 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {0x0}], 0x2) [ 240.510584][T10548] ? key_alloc+0xa66/0x1140 [ 240.531933][T10548] __key_instantiate_and_link+0xd7/0x3b0 [ 240.531956][T10548] key_create_or_update+0x62f/0xba0 [ 240.562513][T10548] ? key_type_lookup+0xf0/0xf0 [ 240.567308][T10548] ? lock_downgrade+0x880/0x880 [ 240.572201][T10548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 240.578460][T10548] __x64_sys_add_key+0x2bd/0x4f0 [ 240.583419][T10548] ? key_get_type_from_user.constprop.0+0x110/0x110 [ 240.590017][T10548] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 240.595500][T10548] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.601588][T10548] ? lockdep_hardirqs_on+0x418/0x5d0 [ 240.606888][T10548] ? trace_hardirqs_on+0x67/0x230 [ 240.612041][T10548] do_syscall_64+0x103/0x610 [ 240.616930][T10548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.622838][T10548] RIP: 0033:0x458da9 [ 240.626751][T10548] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.646367][T10548] RSP: 002b:00007f324ec13c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 240.654797][T10548] RAX: ffffffffffffffda RBX: 00007f324ec13c90 RCX: 0000000000458da9 [ 240.662792][T10548] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140 [ 240.670776][T10548] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000 [ 240.678759][T10548] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f324ec146d4 [ 240.686741][T10548] R13: 00000000004becd7 R14: 00000000004cfa68 R15: 0000000000000003 20:52:54 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encry\nted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 240.708635][T10552] FAULT_INJECTION: forcing a failure. [ 240.708635][T10552] name failslab, interval 1, probability 0, space 0, times 0 [ 240.751837][T10552] CPU: 1 PID: 10552 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #97 [ 240.759876][T10552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.769947][T10552] Call Trace: [ 240.773265][T10552] dump_stack+0x172/0x1f0 [ 240.777637][T10552] should_fail.cold+0xa/0x15 [ 240.782252][T10552] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 240.788091][T10552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.794441][T10552] ? should_fail+0x1de/0x852 20:52:54 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encry%ted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 240.800548][T10552] __should_failslab+0x121/0x190 [ 240.805509][T10552] should_failslab+0x9/0x14 [ 240.810029][T10552] kmem_cache_alloc_node_trace+0x5a/0x720 [ 240.815772][T10552] __kmalloc_node_track_caller+0x3d/0x70 [ 240.821424][T10552] __kmalloc_reserve.isra.0+0x40/0xf0 [ 240.826820][T10552] __alloc_skb+0x10b/0x5e0 [ 240.831253][T10552] ? skb_trim+0x190/0x190 [ 240.835603][T10552] ? if_nlmsg_size+0x4b8/0xa00 [ 240.840394][T10552] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 240.845701][T10552] rtmsg_ifinfo_event.part.0+0x43/0xe0 20:52:54 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encryp\ned\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:54 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/109, 0x6d}], 0x1) [ 240.851614][T10552] rtmsg_ifinfo+0x8d/0xa0 [ 240.855961][T10552] __dev_notify_flags+0x235/0x2c0 [ 240.861006][T10552] ? dev_change_name+0xa70/0xa70 [ 240.866046][T10552] ? __dev_change_flags+0x513/0x6e0 [ 240.871365][T10552] ? dev_set_allmulti+0x30/0x30 [ 240.876236][T10552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.882516][T10552] dev_change_flags+0x10d/0x170 [ 240.887390][T10552] devinet_ioctl+0xde6/0x1cf0 [ 240.892085][T10552] inet_ioctl+0x2d4/0x410 [ 240.896453][T10552] ? inet_stream_connect+0xa0/0xa0 [ 240.901610][T10552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.907859][T10552] ? _parse_integer+0x139/0x190 [ 240.912826][T10552] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 240.919351][T10552] ? _kstrtoull+0x14c/0x200 [ 240.923876][T10552] sock_do_ioctl+0xde/0x300 [ 240.928396][T10552] ? compat_ifr_data_ioctl+0x160/0x160 [ 240.933877][T10552] ? tomoyo_domain+0xc5/0x160 [ 240.938569][T10552] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 240.944871][T10552] ? tomoyo_init_request_info+0x105/0x1d0 20:52:54 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encryp%ed\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 240.950704][T10552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 240.957510][T10552] ? tomoyo_path_number_perm+0x263/0x520 [ 240.963429][T10552] sock_ioctl+0x32b/0x610 [ 240.967778][T10552] ? dlci_ioctl_set+0x40/0x40 [ 240.972467][T10552] ? __fget+0x35a/0x550 [ 240.976844][T10552] ? dlci_ioctl_set+0x40/0x40 [ 240.981553][T10552] do_vfs_ioctl+0xd6e/0x1390 [ 240.986176][T10552] ? ioctl_preallocate+0x210/0x210 [ 240.991405][T10552] ? __fget+0x381/0x550 [ 240.995577][T10552] ? ksys_dup3+0x3e0/0x3e0 [ 241.000021][T10552] ? tomoyo_file_ioctl+0x23/0x30 [ 241.004978][T10552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.011236][T10552] ? security_file_ioctl+0x93/0xc0 [ 241.016371][T10552] ksys_ioctl+0xab/0xd0 [ 241.020550][T10552] __x64_sys_ioctl+0x73/0xb0 [ 241.025156][T10552] do_syscall_64+0x103/0x610 [ 241.029763][T10552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.035669][T10552] RIP: 0033:0x458da9 [ 241.039566][T10552] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.059516][T10552] RSP: 002b:00007ff8fad3dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.067915][T10552] RAX: ffffffffffffffda RBX: 00007ff8fad3dc90 RCX: 0000000000458da9 [ 241.075870][T10552] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000004 [ 241.083852][T10552] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 241.091812][T10552] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fad3e6d4 [ 241.099771][T10552] R13: 00000000004c4635 R14: 00000000004d7ec8 R15: 0000000000000005 20:52:55 executing program 3 (fault-call:4 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:55 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypt\nd\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:55 executing program 1 (fault-call:1 fault-nth:11): keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:55 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x100000000000000, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:55 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x40000000, 0x0, 0x0) 20:52:55 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypt%d\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:55 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/109, 0x6d}], 0x1) [ 241.237978][T10583] encrypted_key: master key parameter '' is invalid 20:52:55 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:55 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x200000000000000, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:55 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypt.d\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 241.418331][T10598] encrypted_key: master key parameter '' is invalid 20:52:55 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/109, 0x6d}], 0x1) 20:52:55 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypte\n\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 241.624760][T10591] FAULT_INJECTION: forcing a failure. [ 241.624760][T10591] name failslab, interval 1, probability 0, space 0, times 0 [ 241.646515][T10591] CPU: 0 PID: 10591 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #97 [ 241.654625][T10591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.664691][T10591] Call Trace: [ 241.667975][T10591] dump_stack+0x172/0x1f0 [ 241.672360][T10591] should_fail.cold+0xa/0x15 [ 241.677028][T10591] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 241.688171][T10591] ? __local_bh_enable_ip+0x15a/0x270 [ 241.694369][T10591] __should_failslab+0x121/0x190 [ 241.699295][T10591] should_failslab+0x9/0x14 [ 241.703794][T10591] kmem_cache_alloc_node_trace+0x5a/0x720 [ 241.709510][T10591] __kmalloc_node_track_caller+0x3d/0x70 [ 241.715130][T10591] __kmalloc_reserve.isra.0+0x40/0xf0 [ 241.720495][T10591] pskb_expand_head+0x14e/0xdd0 [ 241.725350][T10591] netlink_trim+0x218/0x270 [ 241.729857][T10591] netlink_broadcast_filtered+0x64/0xb20 [ 241.735474][T10591] ? skb_trim+0x190/0x190 [ 241.739803][T10591] ? rtmsg_ifinfo_build_skb+0xc9/0x1a0 [ 241.745248][T10591] nlmsg_notify+0x93/0x1c0 [ 241.749844][T10591] rtmsg_ifinfo_event.part.0+0xb0/0xe0 [ 241.755293][T10591] rtmsg_ifinfo+0x8d/0xa0 [ 241.759610][T10591] __dev_notify_flags+0x235/0x2c0 [ 241.764624][T10591] ? dev_change_name+0xa70/0xa70 [ 241.769559][T10591] ? __dev_change_flags+0x513/0x6e0 [ 241.774750][T10591] ? dev_set_allmulti+0x30/0x30 [ 241.779596][T10591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.785825][T10591] dev_change_flags+0x10d/0x170 [ 241.790670][T10591] devinet_ioctl+0xde6/0x1cf0 [ 241.795339][T10591] inet_ioctl+0x2d4/0x410 [ 241.799651][T10591] ? inet_stream_connect+0xa0/0xa0 [ 241.804763][T10591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.811001][T10591] ? _parse_integer+0x139/0x190 [ 241.815841][T10591] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 241.822066][T10591] ? _kstrtoull+0x14c/0x200 [ 241.826558][T10591] sock_do_ioctl+0xde/0x300 [ 241.831045][T10591] ? compat_ifr_data_ioctl+0x160/0x160 [ 241.836494][T10591] ? tomoyo_domain+0xc5/0x160 [ 241.841164][T10591] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 241.847535][T10591] ? tomoyo_init_request_info+0x105/0x1d0 [ 241.853272][T10591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.859512][T10591] ? tomoyo_path_number_perm+0x263/0x520 [ 241.865136][T10591] sock_ioctl+0x32b/0x610 [ 241.869453][T10591] ? dlci_ioctl_set+0x40/0x40 [ 241.874293][T10591] ? __fget+0x35a/0x550 [ 241.878446][T10591] ? dlci_ioctl_set+0x40/0x40 [ 241.883114][T10591] do_vfs_ioctl+0xd6e/0x1390 [ 241.887710][T10591] ? ioctl_preallocate+0x210/0x210 [ 241.892807][T10591] ? __fget+0x381/0x550 [ 241.896948][T10591] ? ksys_dup3+0x3e0/0x3e0 [ 241.901353][T10591] ? tomoyo_file_ioctl+0x23/0x30 [ 241.906281][T10591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 241.912533][T10591] ? security_file_ioctl+0x93/0xc0 [ 241.917638][T10591] ksys_ioctl+0xab/0xd0 [ 241.921822][T10591] __x64_sys_ioctl+0x73/0xb0 [ 241.926400][T10591] do_syscall_64+0x103/0x610 [ 241.930980][T10591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.936859][T10591] RIP: 0033:0x458da9 [ 241.940740][T10591] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.960348][T10591] RSP: 002b:00007ff8fad3dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 241.968760][T10591] RAX: ffffffffffffffda RBX: 00007ff8fad3dc90 RCX: 0000000000458da9 [ 241.977092][T10591] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000004 [ 241.985049][T10591] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 241.993028][T10591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fad3e6d4 [ 242.000992][T10591] R13: 00000000004c4635 R14: 00000000004d7ec8 R15: 0000000000000005 20:52:55 executing program 3 (fault-call:4 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:55 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x100000000000000, 0x0, 0x0) 20:52:55 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='\nncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:55 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x300000000000000, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:55 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypte%\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:55 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:52:56 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x02', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:56 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='%ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:56 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x200000000000000, 0x0, 0x0) 20:52:56 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:52:56 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x4000000000000000, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:56 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x03', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 242.430700][T10633] FAULT_INJECTION: forcing a failure. [ 242.430700][T10633] name failslab, interval 1, probability 0, space 0, times 0 [ 242.463028][T10633] CPU: 0 PID: 10633 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #97 [ 242.471058][T10633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.471066][T10633] Call Trace: [ 242.471096][T10633] dump_stack+0x172/0x1f0 [ 242.471122][T10633] should_fail.cold+0xa/0x15 [ 242.471142][T10633] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 242.471165][T10633] ? ___might_sleep+0x163/0x280 [ 242.471187][T10633] __should_failslab+0x121/0x190 [ 242.471204][T10633] should_failslab+0x9/0x14 [ 242.471224][T10633] kmem_cache_alloc_trace+0x2d1/0x760 [ 242.471252][T10633] inetdev_event+0x928/0x1240 [ 242.523832][T10633] ? lock_downgrade+0x880/0x880 [ 242.523854][T10633] ? kasan_check_read+0x11/0x20 [ 242.523874][T10633] ? inetdev_init+0x470/0x470 [ 242.538245][T10633] ? kasan_check_write+0x14/0x20 [ 242.538261][T10633] ? up_read+0x131/0x180 [ 242.538290][T10633] notifier_call_chain+0xc7/0x240 [ 242.547634][T10633] ? inetdev_init+0x470/0x470 [ 242.557320][T10633] ? notifier_call_chain+0xc7/0x240 [ 242.557342][T10633] raw_notifier_call_chain+0x2e/0x40 [ 242.557362][T10633] call_netdevice_notifiers_info+0x3f/0x90 [ 242.557378][T10633] __dev_notify_flags+0x121/0x2c0 [ 242.557397][T10633] ? dev_change_name+0xa70/0xa70 [ 242.578657][T10633] ? __dev_change_flags+0x513/0x6e0 [ 242.578677][T10633] ? dev_set_allmulti+0x30/0x30 [ 242.578699][T10633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.599903][T10633] dev_change_flags+0x10d/0x170 [ 242.604777][T10633] devinet_ioctl+0xde6/0x1cf0 [ 242.609472][T10633] inet_ioctl+0x2d4/0x410 [ 242.613830][T10633] ? inet_stream_connect+0xa0/0xa0 [ 242.618977][T10633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.625276][T10633] ? _parse_integer+0x139/0x190 [ 242.630182][T10633] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 242.636445][T10633] ? _kstrtoull+0x14c/0x200 [ 242.640984][T10633] sock_do_ioctl+0xde/0x300 [ 242.645514][T10633] ? compat_ifr_data_ioctl+0x160/0x160 [ 242.650982][T10633] ? tomoyo_domain+0xc5/0x160 [ 242.655648][T10633] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 242.661964][T10633] ? tomoyo_init_request_info+0x105/0x1d0 [ 242.667672][T10633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.673906][T10633] ? tomoyo_path_number_perm+0x263/0x520 [ 242.679620][T10633] sock_ioctl+0x32b/0x610 [ 242.683943][T10633] ? dlci_ioctl_set+0x40/0x40 [ 242.688800][T10633] ? __fget+0x35a/0x550 [ 242.699164][T10633] ? dlci_ioctl_set+0x40/0x40 [ 242.703833][T10633] do_vfs_ioctl+0xd6e/0x1390 [ 242.708413][T10633] ? ioctl_preallocate+0x210/0x210 [ 242.713598][T10633] ? __fget+0x381/0x550 [ 242.717766][T10633] ? ksys_dup3+0x3e0/0x3e0 [ 242.722213][T10633] ? tomoyo_file_ioctl+0x23/0x30 [ 242.727157][T10633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 242.733401][T10633] ? security_file_ioctl+0x93/0xc0 [ 242.738527][T10633] ksys_ioctl+0xab/0xd0 [ 242.742694][T10633] __x64_sys_ioctl+0x73/0xb0 [ 242.747278][T10633] do_syscall_64+0x103/0x610 [ 242.751859][T10633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.757755][T10633] RIP: 0033:0x458da9 [ 242.761664][T10633] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:52:56 executing program 3 (fault-call:4 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:56 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='.ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:56 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x04', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:56 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x300000000000000, 0x0, 0x0) 20:52:56 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:52:56 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xff03000000000000, &(0x7f0000000440)=[{0x0}], 0x1) [ 242.781284][T10633] RSP: 002b:00007ff8fad3dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 242.789684][T10633] RAX: ffffffffffffffda RBX: 00007ff8fad3dc90 RCX: 0000000000458da9 [ 242.797639][T10633] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000004 [ 242.806666][T10633] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 242.814630][T10633] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fad3e6d4 [ 242.822795][T10633] R13: 00000000004c4635 R14: 00000000004d7ec8 R15: 0000000000000005 20:52:56 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='e\ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:56 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x05', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:56 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='e%crypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:56 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {0x0}], 0x2) 20:52:56 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x2}], 0x1) 20:52:56 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x06', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 243.231108][T10670] FAULT_INJECTION: forcing a failure. [ 243.231108][T10670] name failslab, interval 1, probability 0, space 0, times 0 [ 243.254848][T10670] CPU: 0 PID: 10670 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #97 [ 243.262875][T10670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.272937][T10670] Call Trace: [ 243.276248][T10670] dump_stack+0x172/0x1f0 [ 243.280601][T10670] should_fail.cold+0xa/0x15 [ 243.285208][T10670] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 243.291030][T10670] ? __call_rcu.constprop.0+0x2a3/0x6c0 [ 243.296580][T10670] ? call_rcu+0xb/0x10 [ 243.300653][T10670] ? __call_rcu.constprop.0+0x2a3/0x6c0 [ 243.306206][T10670] ? lockdep_hardirqs_on+0x418/0x5d0 [ 243.311517][T10670] __should_failslab+0x121/0x190 [ 243.316465][T10670] should_failslab+0x9/0x14 [ 243.320989][T10670] kmem_cache_alloc_trace+0x4b/0x760 [ 243.326287][T10670] ____ip_mc_inc_group.constprop.0+0x27c/0xc20 [ 243.332455][T10670] ? ip_mc_add_src+0xf60/0xf60 [ 243.337234][T10670] ? rcu_read_lock_sched_held+0x110/0x130 [ 243.337252][T10670] ? kmem_cache_alloc_trace+0x354/0x760 [ 243.337271][T10670] ip_mc_up+0x13c/0x360 [ 243.337295][T10670] inetdev_event+0xc8c/0x1240 [ 243.348555][T10670] ? lock_downgrade+0x880/0x880 [ 243.348573][T10670] ? kasan_check_read+0x11/0x20 [ 243.348587][T10670] ? inetdev_init+0x470/0x470 [ 243.348602][T10670] ? kasan_check_write+0x14/0x20 [ 243.348613][T10670] ? up_read+0x131/0x180 [ 243.348636][T10670] notifier_call_chain+0xc7/0x240 [ 243.386085][T10670] ? inetdev_init+0x470/0x470 [ 243.390748][T10670] ? notifier_call_chain+0xc7/0x240 [ 243.395943][T10670] raw_notifier_call_chain+0x2e/0x40 [ 243.401221][T10670] call_netdevice_notifiers_info+0x3f/0x90 [ 243.407028][T10670] __dev_notify_flags+0x121/0x2c0 [ 243.412039][T10670] ? dev_change_name+0xa70/0xa70 [ 243.416968][T10670] ? __dev_change_flags+0x513/0x6e0 [ 243.422179][T10670] ? dev_set_allmulti+0x30/0x30 [ 243.427042][T10670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.433302][T10670] dev_change_flags+0x10d/0x170 [ 243.438161][T10670] devinet_ioctl+0xde6/0x1cf0 [ 243.442850][T10670] inet_ioctl+0x2d4/0x410 [ 243.447180][T10670] ? inet_stream_connect+0xa0/0xa0 [ 243.452299][T10670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.458533][T10670] ? _parse_integer+0x139/0x190 [ 243.463396][T10670] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 243.469641][T10670] ? _kstrtoull+0x14c/0x200 [ 243.474151][T10670] sock_do_ioctl+0xde/0x300 [ 243.478653][T10670] ? compat_ifr_data_ioctl+0x160/0x160 [ 243.484106][T10670] ? tomoyo_domain+0xc5/0x160 [ 243.488818][T10670] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 243.495051][T10670] ? tomoyo_init_request_info+0x105/0x1d0 [ 243.500799][T10670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.507115][T10670] ? tomoyo_path_number_perm+0x263/0x520 [ 243.512745][T10670] sock_ioctl+0x32b/0x610 [ 243.517066][T10670] ? dlci_ioctl_set+0x40/0x40 [ 243.521732][T10670] ? __fget+0x35a/0x550 [ 243.525984][T10670] ? dlci_ioctl_set+0x40/0x40 [ 243.530836][T10670] do_vfs_ioctl+0xd6e/0x1390 [ 243.535432][T10670] ? ioctl_preallocate+0x210/0x210 [ 243.540638][T10670] ? __fget+0x381/0x550 [ 243.544795][T10670] ? ksys_dup3+0x3e0/0x3e0 [ 243.549207][T10670] ? tomoyo_file_ioctl+0x23/0x30 [ 243.554131][T10670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 243.560713][T10670] ? security_file_ioctl+0x93/0xc0 [ 243.565824][T10670] ksys_ioctl+0xab/0xd0 [ 243.569988][T10670] __x64_sys_ioctl+0x73/0xb0 [ 243.574569][T10670] do_syscall_64+0x103/0x610 [ 243.579145][T10670] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.585026][T10670] RIP: 0033:0x458da9 [ 243.588912][T10670] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.608517][T10670] RSP: 002b:00007ff8fad3dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 243.616940][T10670] RAX: ffffffffffffffda RBX: 00007ff8fad3dc90 RCX: 0000000000458da9 [ 243.625080][T10670] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000004 20:52:57 executing program 3 (fault-call:4 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:57 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x4000000000000000, 0x0, 0x0) 20:52:57 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en\nrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:57 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\a', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:57 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0xff03000000000000, &(0x7f0000000440)=[{0x0}], 0x1) 20:52:57 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x3}], 0x1) [ 243.633039][T10670] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 243.641001][T10670] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fad3e6d4 [ 243.649081][T10670] R13: 00000000004c4635 R14: 00000000004d7ec8 R15: 0000000000000005 20:52:57 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en#rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:57 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encryptedH', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:57 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encryptedL', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:57 executing program 4 (fault-call:1 fault-nth:0): r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:52:57 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en%rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:57 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x2) [ 243.956579][T10711] FAULT_INJECTION: forcing a failure. [ 243.956579][T10711] name failslab, interval 1, probability 0, space 0, times 0 [ 244.018888][T10711] CPU: 1 PID: 10711 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 244.027203][T10711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.037282][T10711] Call Trace: [ 244.040604][T10711] dump_stack+0x172/0x1f0 [ 244.044950][T10711] should_fail.cold+0xa/0x15 [ 244.049557][T10711] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 244.055382][T10711] ? ___might_sleep+0x163/0x280 [ 244.060247][T10711] __should_failslab+0x121/0x190 [ 244.065195][T10711] should_failslab+0x9/0x14 [ 244.067245][T10702] FAULT_INJECTION: forcing a failure. [ 244.067245][T10702] name failslab, interval 1, probability 0, space 0, times 0 [ 244.069798][T10711] __kmalloc+0x2dc/0x740 [ 244.069831][T10711] ? __io_uring_register+0x733/0x2070 [ 244.069859][T10711] __io_uring_register+0x733/0x2070 [ 244.097593][T10711] ? __mutex_lock+0x3cd/0x1310 [ 244.102364][T10711] ? __x64_sys_io_uring_register+0x182/0x1f0 [ 244.108365][T10711] ? io_sq_wq_submit_work+0x10f0/0x10f0 [ 244.113915][T10711] ? fput+0x1b/0x20 [ 244.117731][T10711] ? ksys_write+0x1f1/0x2d0 [ 244.122249][T10711] __x64_sys_io_uring_register+0x193/0x1f0 [ 244.128069][T10711] do_syscall_64+0x103/0x610 [ 244.132674][T10711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.138570][T10711] RIP: 0033:0x458da9 [ 244.142554][T10711] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.162171][T10711] RSP: 002b:00007f3287cfbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 244.170638][T10711] RAX: ffffffffffffffda RBX: 00007f3287cfbc90 RCX: 0000000000458da9 [ 244.178628][T10711] RDX: 0000000020000440 RSI: 0000000000000000 RDI: 0000000000000003 [ 244.186696][T10711] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 244.194681][T10711] R10: 0000000000000002 R11: 0000000000000246 R12: 00007f3287cfc6d4 [ 244.202662][T10711] R13: 00000000004cb820 R14: 00000000004d22b8 R15: 0000000000000004 [ 244.210784][T10702] CPU: 0 PID: 10702 Comm: syz-executor.3 Not tainted 5.1.0-rc7+ #97 [ 244.218797][T10702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.228880][T10702] Call Trace: [ 244.232427][T10702] dump_stack+0x172/0x1f0 [ 244.236753][T10702] should_fail.cold+0xa/0x15 [ 244.241359][T10702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 244.247169][T10702] ? ___might_sleep+0x163/0x280 [ 244.252032][T10702] __should_failslab+0x121/0x190 [ 244.256956][T10702] should_failslab+0x9/0x14 [ 244.261447][T10702] __kmalloc+0x2dc/0x740 [ 244.265679][T10702] ? __lock_acquire+0x548/0x3fb0 [ 244.270605][T10702] ? save_stack+0xa9/0xd0 [ 244.274938][T10702] ? fib_create_info+0xe96/0x3fc0 [ 244.279947][T10702] fib_create_info+0xe96/0x3fc0 [ 244.284800][T10702] ? fib_info_update_nh_saddr+0x200/0x200 [ 244.290544][T10702] ? __lock_acquire+0x548/0x3fb0 [ 244.295481][T10702] fib_table_insert+0x1b7/0x16f0 [ 244.300438][T10702] ? fib_magic.isra.0+0x1b1/0x590 [ 244.305450][T10702] ? find_held_lock+0x35/0x130 [ 244.310216][T10702] ? fib_magic.isra.0+0x1b1/0x590 [ 244.315243][T10702] ? fib_table_lookup+0x1e30/0x1e30 [ 244.320441][T10702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.326667][T10702] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 244.332375][T10702] ? fib_new_table+0x272/0x3f0 [ 244.337144][T10702] fib_magic.isra.0+0x415/0x590 [ 244.341984][T10702] ? inet_addr_type+0x400/0x400 [ 244.346846][T10702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.353086][T10702] ? inetdev_event+0x33f/0x1240 [ 244.357923][T10702] ? lock_downgrade+0x880/0x880 [ 244.362799][T10702] fib_add_ifaddr+0x179/0x500 [ 244.367481][T10702] fib_netdev_event+0x2a7/0x3f0 [ 244.372340][T10702] notifier_call_chain+0xc7/0x240 [ 244.377351][T10702] raw_notifier_call_chain+0x2e/0x40 [ 244.382626][T10702] call_netdevice_notifiers_info+0x3f/0x90 [ 244.388439][T10702] __dev_notify_flags+0x121/0x2c0 [ 244.393465][T10702] ? dev_change_name+0xa70/0xa70 [ 244.398412][T10702] ? __dev_change_flags+0x513/0x6e0 [ 244.403611][T10702] ? dev_set_allmulti+0x30/0x30 [ 244.408455][T10702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.414702][T10702] dev_change_flags+0x10d/0x170 [ 244.419579][T10702] devinet_ioctl+0xde6/0x1cf0 [ 244.424252][T10702] inet_ioctl+0x2d4/0x410 [ 244.428569][T10702] ? inet_stream_connect+0xa0/0xa0 [ 244.433694][T10702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.439920][T10702] ? _parse_integer+0x139/0x190 [ 244.444796][T10702] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 244.451040][T10702] ? _kstrtoull+0x14c/0x200 [ 244.455567][T10702] sock_do_ioctl+0xde/0x300 [ 244.460086][T10702] ? compat_ifr_data_ioctl+0x160/0x160 [ 244.465548][T10702] ? tomoyo_domain+0xc5/0x160 [ 244.470230][T10702] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 244.476486][T10702] ? tomoyo_init_request_info+0x105/0x1d0 [ 244.482207][T10702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.488476][T10702] ? tomoyo_path_number_perm+0x263/0x520 [ 244.494118][T10702] sock_ioctl+0x32b/0x610 [ 244.498439][T10702] ? dlci_ioctl_set+0x40/0x40 [ 244.503127][T10702] ? __fget+0x35a/0x550 [ 244.507296][T10702] ? dlci_ioctl_set+0x40/0x40 [ 244.511965][T10702] do_vfs_ioctl+0xd6e/0x1390 [ 244.516544][T10702] ? ioctl_preallocate+0x210/0x210 [ 244.521654][T10702] ? __fget+0x381/0x550 [ 244.525827][T10702] ? ksys_dup3+0x3e0/0x3e0 [ 244.530259][T10702] ? tomoyo_file_ioctl+0x23/0x30 [ 244.535191][T10702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 244.541448][T10702] ? security_file_ioctl+0x93/0xc0 [ 244.546746][T10702] ksys_ioctl+0xab/0xd0 [ 244.550926][T10702] __x64_sys_ioctl+0x73/0xb0 [ 244.555518][T10702] do_syscall_64+0x103/0x610 [ 244.560096][T10702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.565974][T10702] RIP: 0033:0x458da9 [ 244.569869][T10702] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.589460][T10702] RSP: 002b:00007ff8fad3dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 244.597871][T10702] RAX: ffffffffffffffda RBX: 00007ff8fad3dc90 RCX: 0000000000458da9 [ 244.605829][T10702] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000004 20:52:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:58 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x300}], 0x1) 20:52:58 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en*rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:58 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted`', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 244.613795][T10702] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 244.621843][T10702] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8fad3e6d4 [ 244.629819][T10702] R13: 00000000004c4635 R14: 00000000004d7ec8 R15: 0000000000000005 20:52:58 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en+rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:58 executing program 4 (fault-call:1 fault-nth:1): r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:52:58 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encryptedh', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:58 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x3) 20:52:58 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en-rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:58 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x4000}], 0x1) [ 244.873264][T10740] FAULT_INJECTION: forcing a failure. [ 244.873264][T10740] name failslab, interval 1, probability 0, space 0, times 0 [ 244.904947][T10740] CPU: 1 PID: 10740 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 244.912973][T10740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.923124][T10740] Call Trace: [ 244.926442][T10740] dump_stack+0x172/0x1f0 [ 244.930799][T10740] should_fail.cold+0xa/0x15 [ 244.935410][T10740] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 244.941237][T10740] ? ___might_sleep+0x163/0x280 [ 244.946199][T10740] __should_failslab+0x121/0x190 [ 244.951149][T10740] should_failslab+0x9/0x14 [ 244.955669][T10740] __kmalloc+0x2dc/0x740 [ 244.959920][T10740] ? __io_uring_register+0x985/0x2070 [ 244.965308][T10740] ? rcu_read_lock_sched_held+0x110/0x130 [ 244.971042][T10740] ? __io_uring_register+0x9b8/0x2070 [ 244.976525][T10740] __io_uring_register+0x9b8/0x2070 [ 244.981818][T10740] ? __mutex_lock+0x3cd/0x1310 [ 244.986607][T10740] ? io_sq_wq_submit_work+0x10f0/0x10f0 [ 244.992161][T10740] ? fput+0x1b/0x20 [ 244.995974][T10740] ? ksys_write+0x1f1/0x2d0 [ 245.000510][T10740] __x64_sys_io_uring_register+0x193/0x1f0 [ 245.006331][T10740] do_syscall_64+0x103/0x610 [ 245.010962][T10740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.016858][T10740] RIP: 0033:0x458da9 [ 245.020756][T10740] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.040367][T10740] RSP: 002b:00007f3287cfbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 245.049838][T10740] RAX: ffffffffffffffda RBX: 00007f3287cfbc90 RCX: 0000000000458da9 [ 245.057812][T10740] RDX: 0000000020000440 RSI: 0000000000000000 RDI: 0000000000000003 [ 245.065897][T10740] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:52:58 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encryptedl', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:58 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en.rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 245.073874][T10740] R10: 0000000000000002 R11: 0000000000000246 R12: 00007f3287cfc6d4 [ 245.081865][T10740] R13: 00000000004cb820 R14: 00000000004d22b8 R15: 0000000000000004 20:52:59 executing program 4 (fault-call:1 fault-nth:2): r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:52:59 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encryptedt', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:59 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='en0rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x2, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:59 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0xff03}], 0x1) 20:52:59 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x300) 20:52:59 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encryptedz', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:59 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enXrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 245.390052][T10773] FAULT_INJECTION: forcing a failure. [ 245.390052][T10773] name failslab, interval 1, probability 0, space 0, times 0 [ 245.420484][T10773] CPU: 0 PID: 10773 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 245.428550][T10773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.438629][T10773] Call Trace: [ 245.441938][T10773] dump_stack+0x172/0x1f0 [ 245.446290][T10773] should_fail.cold+0xa/0x15 [ 245.450904][T10773] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 245.456733][T10773] ? ___might_sleep+0x163/0x280 [ 245.461608][T10773] __should_failslab+0x121/0x190 [ 245.466580][T10773] should_failslab+0x9/0x14 [ 245.466597][T10773] __kmalloc+0x2dc/0x740 [ 245.466611][T10773] ? __io_uring_register+0x985/0x2070 [ 245.466625][T10773] ? __io_uring_register+0x9cf/0x2070 [ 245.466641][T10773] __io_uring_register+0x9cf/0x2070 [ 245.466665][T10773] ? __mutex_lock+0x3cd/0x1310 [ 245.496225][T10773] ? io_sq_wq_submit_work+0x10f0/0x10f0 [ 245.501791][T10773] ? fput+0x1b/0x20 [ 245.505633][T10773] ? ksys_write+0x1f1/0x2d0 [ 245.510170][T10773] __x64_sys_io_uring_register+0x193/0x1f0 [ 245.516017][T10773] do_syscall_64+0x103/0x610 [ 245.520629][T10773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.526616][T10773] RIP: 0033:0x458da9 [ 245.530529][T10773] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.550176][T10773] RSP: 002b:00007f3287cfbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 245.558608][T10773] RAX: ffffffffffffffda RBX: 00007f3287cfbc90 RCX: 0000000000458da9 [ 245.566598][T10773] RDX: 0000000020000440 RSI: 0000000000000000 RDI: 0000000000000003 [ 245.574577][T10773] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 245.582562][T10773] R10: 0000000000000002 R11: 0000000000000246 R12: 00007f3287cfc6d4 20:52:59 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='endrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:59 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 245.590632][T10773] R13: 00000000004cb820 R14: 00000000004d22b8 R15: 0000000000000004 20:52:59 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x4000) 20:52:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5421, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:59 executing program 4 (fault-call:1 fault-nth:3): r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:52:59 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enirypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:59 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x1000000}], 0x1) [ 245.707110][T10789] encrypted_key: master key parameter '' is invalid 20:52:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5450, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:59 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enlrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:59 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x1000000) [ 245.836602][T10799] FAULT_INJECTION: forcing a failure. [ 245.836602][T10799] name failslab, interval 1, probability 0, space 0, times 0 20:52:59 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 245.949852][T10799] CPU: 0 PID: 10799 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 245.957884][T10799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.967954][T10799] Call Trace: [ 245.971355][T10799] dump_stack+0x172/0x1f0 [ 245.975731][T10799] should_fail.cold+0xa/0x15 [ 245.980343][T10799] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 245.986173][T10799] ? ___might_sleep+0x163/0x280 [ 245.991039][T10799] __should_failslab+0x121/0x190 [ 245.996005][T10799] should_failslab+0x9/0x14 [ 246.000536][T10799] __kmalloc+0x2dc/0x740 [ 246.004884][T10799] ? __io_uring_register+0x985/0x2070 [ 246.010275][T10799] ? __io_uring_register+0xa38/0x2070 [ 246.015663][T10799] __io_uring_register+0xa38/0x2070 [ 246.020890][T10799] ? __mutex_lock+0x3cd/0x1310 [ 246.025692][T10799] ? io_sq_wq_submit_work+0x10f0/0x10f0 [ 246.031247][T10799] ? fput+0x1b/0x20 [ 246.035066][T10799] ? ksys_write+0x1f1/0x2d0 [ 246.039235][T10821] encrypted_key: master key parameter '' is invalid [ 246.048462][T10799] __x64_sys_io_uring_register+0x193/0x1f0 [ 246.048487][T10799] do_syscall_64+0x103/0x610 [ 246.048519][T10799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.048531][T10799] RIP: 0033:0x458da9 [ 246.048546][T10799] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:52:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5451, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:52:59 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enorypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:52:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5452, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:00 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:00 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x2000000}], 0x1) [ 246.048554][T10799] RSP: 002b:00007f3287cfbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 246.048567][T10799] RAX: ffffffffffffffda RBX: 00007f3287cfbc90 RCX: 0000000000458da9 [ 246.048575][T10799] RDX: 0000000020000440 RSI: 0000000000000000 RDI: 0000000000000003 [ 246.048584][T10799] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 246.048593][T10799] R10: 0000000000000002 R11: 0000000000000246 R12: 00007f3287cfc6d4 [ 246.048601][T10799] R13: 00000000004cb820 R14: 00000000004d22b8 R15: 0000000000000004 20:53:00 executing program 4 (fault-call:1 fault-nth:4): r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:53:00 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enprypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x5460, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 246.214531][T10832] encrypted_key: master key parameter '' is invalid 20:53:00 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x2000000) 20:53:00 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x3000000}], 0x1) 20:53:00 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='ensrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:00 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 246.386645][T10845] FAULT_INJECTION: forcing a failure. [ 246.386645][T10845] name failslab, interval 1, probability 0, space 0, times 0 [ 246.428610][T10845] CPU: 0 PID: 10845 Comm: syz-executor.4 Not tainted 5.1.0-rc7+ #97 [ 246.437618][T10845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.447695][T10845] Call Trace: [ 246.451190][T10845] dump_stack+0x172/0x1f0 [ 246.455557][T10845] should_fail.cold+0xa/0x15 [ 246.460179][T10845] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 246.466959][T10845] ? ___might_sleep+0x163/0x280 [ 246.466981][T10845] __should_failslab+0x121/0x190 [ 246.466997][T10845] should_failslab+0x9/0x14 [ 246.467013][T10845] __kmalloc+0x2dc/0x740 [ 246.467030][T10845] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 246.467051][T10845] ? io_account_mem+0x112/0x150 [ 246.476925][T10845] ? __io_uring_register+0xa38/0x2070 [ 246.476945][T10845] __io_uring_register+0xa38/0x2070 [ 246.476963][T10845] ? __mutex_lock+0x3cd/0x1310 [ 246.476994][T10845] ? io_sq_wq_submit_work+0x10f0/0x10f0 [ 246.477013][T10845] ? fput+0x1b/0x20 20:53:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8901, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8902, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 246.526543][T10845] ? ksys_write+0x1f1/0x2d0 [ 246.531350][T10845] __x64_sys_io_uring_register+0x193/0x1f0 [ 246.533856][T10858] encrypted_key: master key parameter '' is invalid [ 246.537200][T10845] do_syscall_64+0x103/0x610 [ 246.537222][T10845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.537233][T10845] RIP: 0033:0x458da9 20:53:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8903, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:00 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 246.537248][T10845] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.537265][T10845] RSP: 002b:00007f3287cfbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 246.549534][T10845] RAX: ffffffffffffffda RBX: 00007f3287cfbc90 RCX: 0000000000458da9 [ 246.549544][T10845] RDX: 0000000020000440 RSI: 0000000000000000 RDI: 0000000000000003 [ 246.549552][T10845] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:53:00 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enurypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:00 executing program 4 (fault-call:1 fault-nth:5): r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:53:00 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 246.549560][T10845] R10: 0000000000000002 R11: 0000000000000246 R12: 00007f3287cfc6d4 [ 246.549569][T10845] R13: 00000000004cb820 R14: 00000000004d22b8 R15: 0000000000000004 [ 246.654983][T10867] encrypted_key: master key parameter '' is invalid 20:53:00 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x3000000) 20:53:00 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x40000000}], 0x1) 20:53:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8904, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:00 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enxrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 246.759895][T10874] encrypted_key: master key parameter '' is invalid 20:53:00 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:00 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:53:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8905, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:00 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x40000000) 20:53:00 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enc\nypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 246.952882][T10893] encrypted_key: master key parameter '' is invalid 20:53:00 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0xff030000}], 0x1) 20:53:00 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:00 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x2, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:53:00 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='enc%ypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8906, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 247.110085][T10911] encrypted_key: master key parameter '' is invalid 20:53:01 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x100000000000000) 20:53:01 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encr\npted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:01 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x100000000000000}], 0x1) 20:53:01 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8907, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:01 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x3, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:53:01 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encr%pted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 247.358555][T10937] encrypted_key: master key parameter '' is invalid 20:53:01 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:01 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x200000000000000) 20:53:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8908, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:01 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x200000000000000}], 0x1) 20:53:01 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encry\nted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 247.535873][T10953] encrypted_key: master key parameter '' is invalid 20:53:01 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:01 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x300000000000000}], 0x1) 20:53:01 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encry%ted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8909, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:01 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x300, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:53:01 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x300000000000000) [ 247.687911][T10963] encrypted_key: master key parameter '' is invalid 20:53:01 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encryp\ned\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:01 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:01 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x4000000000000000) 20:53:01 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encryp%ed\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890a, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:01 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0x4000000000000000}], 0x1) 20:53:01 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x4000, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) [ 247.944670][T10988] encrypted_key: master key parameter '' is invalid 20:53:01 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\xff', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890b, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:01 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x1, 0x20000) socket$inet_sctp(0x2, 0x5, 0x84) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {}, {}]}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:53:02 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypt\nd\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:02 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0, 0xff03000000000000}], 0x1) 20:53:02 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x1000000, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:53:02 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890c, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:02 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypt%d\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) [ 248.273775][T11024] encrypted_key: master key parameter '' is invalid 20:53:02 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:02 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}], 0x2) 20:53:02 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypt.d\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:02 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x842, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000340)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x804000}, 0xc, &(0x7f0000000100)={&(0x7f0000000640)={0xfffffffffffffe7d, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x998e}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xce}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe30}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x36}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe3d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffeffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r3 = gettid() r4 = fcntl$getown(r1, 0x9) setpgid(r3, r4) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4020}, 0xc, &(0x7f0000000200)={&(0x7f0000000800)={0x1780, 0x21, 0x20, 0x70bd27, 0x25dfdbfd, {0x19}, [@nested={0x17c, 0x33, [@generic="9c1eba17ce32f4e67d84e6d11efd00c67ee61fdf7ef520c8931be0e1b96861ac806fa484a43e8f50edacba111d05043a29fce642b5e46ca35732400f30161449a9e4ac6883459b7863529fe105c6cfe8df3f7484593e29fe24e43b58a2ec6da7ef743435f997d691116df8d320c1e23ccb8860ec24478f4cf8a7eecb197f9927ae850d2c17de61328b11a962ffe77a5eccef0ea3c8ade2585c523810e07cc81e6807d253ec2915937340dda64a4a8823fabc83e47f3725138340e066aa3ed79ec0c05d84ce0a897c0971cabe9fb80361a4dc9eff70daa0c3bc0bab1acc", @generic="1e56aa637702fd5df5ccb4dc734779c314b53c15b21dc8907a13570df2af0c82c6629664d28fcf77604d16c0ee481ad38e3f6166d835aec9bac42d2cf2e0e06a1053aaa66e29000ebe45eeab572ac1ccc49b8413f6571b301d11f1eb497420bdef8988ed546e400826be6f0ab4b5022b87cc8d22e94c2e76409116ae7806a9148c19139e4858411437a5ba28569c83417cfc9048504473ba"]}, @typed={0x1c, 0x96, @str='/{cgroupGPLproctrusted\x00'}, @nested={0x8, 0x6e, [@typed={0x4, 0x81}]}, @nested={0x13b8, 0x95, [@generic="4feff506b629e1b379f0c98b95fe0b53acabcd4c7e20b781b8c552e0703e9293ed4149c38886415af401b35b5151cfbd702f378f027df259ec4e004479383b02a8639ddc213b7af24b37c80770d32f", @typed={0x8, 0x3e, @uid=r5}, @generic="10185713ec2b96fa8fbb87d53c0c9fa6aa27cc458b9a4872ca24ce0ff21630b685ee5105e8f793a6ef427fd62e9b774d2ecd5ede9e20598e6a36939f4a42e35c55dd33acfb276335ac78cd27fbabf991946820d52f17877391b74904b020813587df9461668ead4b6b03ed8a379f8347e96bd95e", @generic="f3cab418bb3b176e09748a7cf011cfaf799c576977f29dc2685141c561d653834ac063569706140ee1d0bd04c712f0eb6340318bbb7e67a34d2942c5e9707961188becd459525aab3796e2eb50638ad23d790e4b0d38d22b4fef3c4c5d069461314c858f973f62556a1b6f7fc141212083858acb5e5a5f05bab1175ebb09e7d77e6dff8f4534e9ecbbcd76253bc3c10a2d12c26c1011551dc84eb1dc141f9845623abc54a52be66f16a8a885c1113f76bbba43e7e3c42f2be3d34e7fcb1840048556fcc44538c4ff49ddfe44be2bb4e047d7840a21deaca9bc9103a7ee70285355158c", @generic="a55168bb9476df1b1ec2de9e53840d9f3534778ca310b2725879f7c08bc1dc14bf8cd8b52974001d33c197a9cddfa088c83a5856a200bd81287e2780466cf690053c0ac19355fc07917cdae744a5d293965d5f254477d8634055ea16a16c45fc106da28430d43cbd332e01e79e423e60d8899a3b23a21b1fd7605a", @generic="744b48e544162c2f6588ae6857e0f4176f71279b3cddd11477da84a06fd27580d2148340b833a2e0ea5007f32a2a19cddcc354a06d7493c806ab01539e1a540c3098979778bc4f643765706703d36af3e3a7a9d9c803f7a9c93b497a79641ee0c30500aa1d2e0b16873cec6f2c76db7050ac2587ecf30f503b0aba0e9f5242bac23f3620bad5e81793190622e2119c611eea1a4bfc9088d9027963918c036d627723d0ebb966dda8f8a905ff69393f61ef778b0dbba51407122076c12cce3d6c2a", @typed={0x8, 0x3e, @ipv4=@loopback}, @generic="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", @generic="05827d7f1bc673833540edda0cb425ac5c2052b6e7fd6b56463412d23813a632bee8e4f5baccda08bd92cb0880674c72d4326e297421392ab15f618df4abb45639bb32235eb7c3de77a38b9296a95e1cd8b1270f326b5d56e505c5c305f0950a42063c24954c68422802075d518f319a96d0d421f61bad8820dd51e9f985d27117367d0a13bd457031abb9b8ebb7eee6ccb6587f5c01af6f399c3bc7d498f09ecbc95304bd01b7f7e0cfd5fd699570dea839e33762c8dc0e21624c3c47e0d1dce83e"]}, @nested={0x214, 0x55, [@typed={0x3c, 0x34, @binary="3c7d2e76eb0917479b0b2297271cba6f4823065ac6b5a231b8da86f42c7315cd30ee02c72385d53e881d4d9f84a9ee5aaec04d49d225de"}, @typed={0x8, 0x47, @fd=r0}, @generic="76519190eb3bf2a8d69c5e3065378c801713b0bd151125fd23dbdf4a9fcc7d820def60288381963921b127da506efa4660b18753bb190c55f4d818ce1d3508acf890724be54b692a326497c626a107ecdb413510746d5640efa6655e68debf45b9a6571aaa259d9224b4e1488aa54f196f45f21dc73a45fdef4ebf76166b77725fcec1b7887dcad247312aab8de0171e9f45a0be7dcc5170f318c425964d397ca294cf315e28588df227e7c027c3c4cfc5b627430f2ca524da79155a4f3aa590613ff64c48c4b1ca984235a961eae99cb1", @typed={0x14, 0x57, @ipv6=@loopback}, @typed={0x60, 0x18, @binary="b8b844881f88f533b100e607aadfc5f892b91c8cc1743d76ebbfb9f8e26682c048053ba337efd9507253fb07d44fb74ebb588bcabf34ec9c3e9ce3296087e354eb7f975e44d600312281e89dd1de27174317214eee9d984680"}, @typed={0xc, 0x77, @binary="a829e92d5854"}, @generic="cd49", @generic="99a9985eb5ae1e9a291a052f393049ad393067e9450bb88ed8c6441e47d6bcd61343d67e510470a900254126f208dc66f24a09ac15d68f3880e8c6bbe927292c37ef6e93d1ad29e14cdde31219b9b31c1bcb82e7dc6b173964a35355430516130539aa20499640ddeda54d22e9ea950c24ce133af294772e"]}]}, 0x1780}, 0x1, 0x0, 0x0, 0xc000}, 0x1) 20:53:02 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x2000000, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:53:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890d, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 248.465375][T11038] encrypted_key: master key parameter '' is invalid 20:53:02 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypte\n\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:02 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x890e, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:02 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200000, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x58) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) 20:53:02 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}], 0x300) 20:53:02 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypte%\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:02 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x3000000, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:53:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8910, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) [ 248.686554][T11061] encrypted_key: master key parameter '' is invalid 20:53:02 executing program 5: r0 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0xa2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1010002}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)={0xa4, r1, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x2}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x1f}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4fc}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4}, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x6000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000000c0)='dctcp-reno\x00', 0xb) r3 = io_uring_setup(0x65, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1}) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f0000000440)=[{0x0}], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$binfmt_misc(r2, &(0x7f0000000280)={'syz1', "46e79089c1ee5365c9c53887a312675927909df99cd839fa3d269904c41e6b73c365aba0373b371ca30f95f2e9d71019a71cede3e198af"}, 0x3b) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000500)={0x9, 0x0, [], {0x0, @bt={0x9, 0x2, 0x0, 0x3, 0xffffffffffffffbf, 0x4, 0x4, 0x6, 0x4, 0xdb9c, 0x100000001, 0x1, 0x7, 0x8, 0x0, 0x8}}}) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r2, &(0x7f0000000240)={0xb, 0x10, 0xfa00, {&(0x7f0000000100), r4}}, 0x18) 20:53:02 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x02', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:02 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:02 executing program 0: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x4, {0x7, 0x1d, 0x10001, 0x20000, 0x7fffffff, 0x8, 0xfc27, 0x9}}, 0x50) r2 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r2, 0xf, 0x1}, 0x14) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x2, 0x80) 20:53:02 executing program 4: r0 = io_uring_setup(0x64, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x40000000, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/109, 0x6d}], 0x2) 20:53:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8912, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 20:53:02 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='update '], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x03', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) 20:53:02 executing program 5: r0 = io_uring_setup(0x200000000065, &(0x7f00000000c0)={0x0, 0x0, 0x4, 0x40000002, 0x3ffffffffffffff}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1) [ 248.983226][T11093] encrypted_key: master key parameter '' is invalid [ 249.044690][T11102] WARNING: CPU: 0 PID: 11102 at include/linux/cpumask.h:121 io_uring_setup+0x1399/0x1ac0 [ 249.054544][T11102] Kernel panic - not syncing: panic_on_warn set ... [ 249.061155][T11102] CPU: 0 PID: 11102 Comm: syz-executor.5 Not tainted 5.1.0-rc7+ #97 [ 249.069141][T11102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.079210][T11102] Call Trace: [ 249.082548][T11102] dump_stack+0x172/0x1f0 [ 249.086893][T11102] ? io_uring_setup+0x12f0/0x1ac0 [ 249.091946][T11102] panic+0x2cb/0x65c [ 249.095853][T11102] ? __warn_printk+0xf3/0xf3 [ 249.100450][T11102] ? io_uring_setup+0x1399/0x1ac0 [ 249.105477][T11102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 249.111735][T11102] ? __warn.cold+0x5/0x45 [ 249.116072][T11102] ? io_uring_setup+0x1399/0x1ac0 [ 249.121104][T11102] __warn.cold+0x20/0x45 [ 249.125351][T11102] ? io_uring_setup+0x1399/0x1ac0 [ 249.130383][T11102] report_bug+0x263/0x2b0 [ 249.134735][T11102] do_error_trap+0x11b/0x200 [ 249.139335][T11102] do_invalid_op+0x37/0x50 [ 249.143872][T11102] ? io_uring_setup+0x1399/0x1ac0 [ 249.148900][T11102] invalid_op+0x14/0x20 [ 249.153320][T11102] RIP: 0010:io_uring_setup+0x1399/0x1ac0 [ 249.159089][T11102] Code: 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 f8 fd ff ff 4c 89 f7 e8 d1 7d e0 ff e9 eb fd ff ff e8 07 67 a8 ff <0f> 0b e9 27 f7 ff ff e8 fb 66 a8 ff 4c 89 ff e8 83 3b 7a ff e9 fd [ 249.178890][T11102] RSP: 0018:ffff888058247dc8 EFLAGS: 00010216 [ 249.185148][T11102] RAX: 0000000000040000 RBX: 0000000040000002 RCX: ffffc9001088c000 [ 249.193311][T11102] RDX: 0000000000000251 RSI: ffffffff81c825a9 RDI: 0000000000000005 [ 249.201305][T11102] RBP: ffff888058247ef0 R08: ffff8880927765c0 R09: ffffed1011ff206c [ 249.209285][T11102] R10: ffffed1011ff206b R11: ffff88808ff9035f R12: ffff88808aa6e500 [ 249.217258][T11102] R13: ffff888058247ec8 R14: ffff88808aa6e540 R15: ffff88808aa6e554 [ 249.226042][T11102] ? io_uring_setup+0x1399/0x1ac0 [ 249.231073][T11102] ? io_uring_setup+0x1399/0x1ac0 [ 249.236101][T11102] ? io_uring_release+0x50/0x50 [ 249.240954][T11102] ? nsecs_to_jiffies+0x30/0x30 [ 249.245822][T11102] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 249.251279][T11102] ? do_syscall_64+0x26/0x610 [ 249.255965][T11102] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.262048][T11102] ? do_syscall_64+0x26/0x610 [ 249.266731][T11102] ? lockdep_hardirqs_on+0x418/0x5d0 [ 249.272044][T11102] __x64_sys_io_uring_setup+0x54/0x80 [ 249.277425][T11102] do_syscall_64+0x103/0x610 [ 249.282021][T11102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.287934][T11102] RIP: 0033:0x458da9 [ 249.291830][T11102] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.311719][T11102] RSP: 002b:00007ff8415d8c78 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 249.320145][T11102] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000458da9 [ 249.328140][T11102] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000200000000065 [ 249.336233][T11102] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 249.344319][T11102] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff8415d96d4 [ 249.352304][T11102] R13: 00000000004bffde R14: 00000000004d2318 R15: 00000000ffffffff [ 249.362361][T11102] Kernel Offset: disabled [ 249.366831][T11102] Rebooting in 86400 seconds..