0000246 R12: 00007f7bf47ae6d4
[  279.207675] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
[  279.273873] CPU: 0 PID: 9111 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60
[  279.280911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  279.290268] Call Trace:
[  279.292886]  dump_stack+0x172/0x1f0
[  279.296530]  should_fail.cold+0xa/0x1b
[  279.300428]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  279.305540]  ? lock_downgrade+0x810/0x810
[  279.309690]  ? ___might_sleep+0x163/0x280
[  279.313855]  __should_failslab+0x121/0x190
[  279.318090]  should_failslab+0x9/0x14
[  279.321894]  kmem_cache_alloc_trace+0x2d1/0x760
[  279.326572]  assoc_array_insert+0xef/0x2d70
[  279.330899]  ? avc_has_perm_noaudit+0x570/0x570
[  279.335573]  ? __lock_is_held+0xb6/0x140
[  279.339643]  ? assoc_array_cancel_edit+0x90/0x90
[  279.344398]  ? lock_acquire+0x16f/0x3f0
[  279.348369]  ? __key_link_begin+0x9d/0x300
[  279.352614]  __key_link_begin+0x12d/0x300
[  279.356771]  key_create_or_update+0x3a1/0xba0
[  279.361272]  ? key_type_lookup+0xf0/0xf0
[  279.365344]  ? lock_downgrade+0x810/0x810
[  279.369506]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  279.375046]  __x64_sys_add_key+0x2bd/0x4f0
[  279.379283]  ? key_get_type_from_user.constprop.0+0x110/0x110
[  279.385167]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  279.389920]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  279.395283]  ? lockdep_hardirqs_on+0x415/0x5d0
[  279.399866]  ? trace_hardirqs_on+0x67/0x230
[  279.404189]  do_syscall_64+0x103/0x610
[  279.408079]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  279.413265] RIP: 0033:0x457e39
[  279.416460] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  279.435356] RSP: 002b:00007f06f6b49c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[  279.443058] RAX: ffffffffffffffda RBX: 00007f06f6b49c90 RCX: 0000000000457e39
[  279.450322] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140
[  279.457587] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000
[  279.464856] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f06f6b4a6d4
18:20:34 executing program 2 (fault-call:1 fault-nth:5):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  279.472121] R13: 00000000004bdd6b R14: 00000000004ce088 R15: 0000000000000003
18:20:34 executing program 4:
mount(0x0, 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0)
r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0xbb64b03179e0c15c, 0x0)
readlinkat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/74, 0x4a)
r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x400, 0x0)
fsetxattr$security_ima(r2, &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@v1={0x2, "cd90"}, 0x3, 0x3)
ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x81)
ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x1, 0x0, [], &(0x7f0000000040)={0x98f905, 0x1000, [], @ptr=0x70a000}})

[  279.510627] syz-executor5 (9101) used greatest stack depth: 22240 bytes left
18:20:34 executing program 5:
r0 = geteuid()
pipe(&(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
write(r2, &(0x7f00000001c0), 0xfffffef3)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
r3 = open(0x0, 0x0, 0x0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0)
r4 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4)
ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f00000000c0))
ioctl$TIOCEXCL(r2, 0x540c)
ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000080))
bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10)
connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @broadcast}, 0xffffffffffffffa5)
getgroups(0x0, &(0x7f00000001c0)=[0x0, 0xee01])
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10)
socket$packet(0x11, 0x2, 0x300)
sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0)
setuid(r0)
sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e21, @local}, 0x10)
open(0x0, 0x940, 0x0)
setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4)

18:20:34 executing program 1 (fault-call:1 fault-nth:8):
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  279.600126] FAULT_INJECTION: forcing a failure.
[  279.600126] name failslab, interval 1, probability 0, space 0, times 0
[  279.712807] CPU: 0 PID: 9123 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  279.719868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  279.729224] Call Trace:
[  279.731830]  dump_stack+0x172/0x1f0
[  279.735482]  should_fail.cold+0xa/0x1b
[  279.739384]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  279.744499]  ? lock_downgrade+0x810/0x810
[  279.748657]  ? ___might_sleep+0x163/0x280
[  279.752822]  __should_failslab+0x121/0x190
[  279.757068]  should_failslab+0x9/0x14
[  279.760880]  kmem_cache_alloc+0x2be/0x710
[  279.765099]  ? file_remove_privs+0x480/0x480
[  279.769514]  ? touch_atime+0xe9/0x2a0
[  279.773323]  ? atime_needs_update+0x5f0/0x5f0
[  279.777832]  __khugepaged_enter+0x3b/0x390
[  279.782078]  shmem_mmap+0x27b/0x300
[  279.785726]  shm_mmap+0x101/0x240
[  279.789201]  mmap_region+0xc37/0x1760
[  279.793020]  ? __x64_sys_brk+0x760/0x760
[  279.797092]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  279.802636]  ? get_unmapped_area+0x295/0x3b0
[  279.807056]  do_mmap+0x8e2/0x1080
[  279.810527]  do_shmat+0xe09/0x1090
[  279.814088]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  279.818854]  ? fput+0x128/0x1a0
[  279.822148]  __x64_sys_shmat+0xd1/0x170
[  279.826138]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  279.830902]  ? do_shmat+0x1090/0x1090
[  279.834712]  ? lockdep_hardirqs_on+0x415/0x5d0
[  279.839317]  ? trace_hardirqs_on+0x67/0x230
[  279.843652]  do_syscall_64+0x103/0x610
[  279.847553]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  279.852757] RIP: 0033:0x457e39
[  279.855993] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  279.874905] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  279.882619] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  279.889891] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  279.897161] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  279.904455] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
18:20:34 executing program 4:
mount(0x0, 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sched_setscheduler(0x0, 0x0, 0x0)
r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0)
r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0xbb64b03179e0c15c, 0x0)
readlinkat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/74, 0x4a)
r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x400, 0x0)
fsetxattr$security_ima(r2, &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@v1={0x2, "cd90"}, 0x3, 0x3)
ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x81)
ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000000)={0x0, 0x1, 0x0, [], &(0x7f0000000040)={0x98f905, 0x1000, [], @ptr=0x70a000}})

[  279.911735] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
18:20:34 executing program 0:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x200280, 0x0)
ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000040)={0x7, 0xa4, 0x2, 0x2, 0x750d, 0x1000})
ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070")
r2 = socket(0x40000000015, 0x805, 0x0)
ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685)
poll(&(0x7f0000000180)=[{r2}], 0xd0, 0x0)

18:20:34 executing program 4:
r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0404309, 0x0)
r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x400040)
ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)

[  280.067156] FAULT_INJECTION: forcing a failure.
[  280.067156] name failslab, interval 1, probability 0, space 0, times 0
[  280.104972] CPU: 1 PID: 9146 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60
[  280.112008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  280.121361] Call Trace:
[  280.123959]  dump_stack+0x172/0x1f0
[  280.127593]  should_fail.cold+0xa/0x1b
[  280.131484]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  280.136591]  ? lock_downgrade+0x810/0x810
[  280.140747]  ? ___might_sleep+0x163/0x280
[  280.144905]  __should_failslab+0x121/0x190
[  280.149143]  should_failslab+0x9/0x14
[  280.152941]  kmem_cache_alloc_trace+0x2d1/0x760
[  280.157623]  assoc_array_insert+0x78c/0x2d70
[  280.162036]  ? avc_has_perm_noaudit+0x570/0x570
[  280.166709]  ? __lock_is_held+0xb6/0x140
[  280.170787]  ? assoc_array_cancel_edit+0x90/0x90
[  280.175544]  ? lock_acquire+0x16f/0x3f0
[  280.179513]  ? __key_link_begin+0x9d/0x300
[  280.183766]  __key_link_begin+0x12d/0x300
[  280.187920]  key_create_or_update+0x3a1/0xba0
[  280.192417]  ? key_type_lookup+0xf0/0xf0
[  280.196484]  ? lock_downgrade+0x810/0x810
[  280.200643]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  280.206181]  __x64_sys_add_key+0x2bd/0x4f0
[  280.210420]  ? key_get_type_from_user.constprop.0+0x110/0x110
[  280.216306]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  280.221065]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  280.226428]  ? lockdep_hardirqs_on+0x415/0x5d0
[  280.231008]  ? trace_hardirqs_on+0x67/0x230
[  280.235333]  do_syscall_64+0x103/0x610
[  280.239220]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  280.244408] RIP: 0033:0x457e39
[  280.247598] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  280.266492] RSP: 002b:00007f06f6b49c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[  280.274196] RAX: ffffffffffffffda RBX: 00007f06f6b49c90 RCX: 0000000000457e39
[  280.281463] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140
[  280.288735] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000
[  280.296003] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f06f6b4a6d4
[  280.303268] R13: 00000000004bdd6b R14: 00000000004ce088 R15: 0000000000000003
[  280.310835] protocol 88fb is buggy, dev hsr_slave_0
[  280.316134] protocol 88fb is buggy, dev hsr_slave_1
[  280.321263] protocol 88fb is buggy, dev hsr_slave_0
[  280.326383] protocol 88fb is buggy, dev hsr_slave_1
18:20:35 executing program 2 (fault-call:1 fault-nth:6):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:35 executing program 4:
clone(0x10040000, 0x0, 0x0, 0x0, 0x0)
r0 = msgget(0xffffffffffffffff, 0x0)
msgctl$IPC_STAT(r0, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0)
ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000140)={0x2, 0x7fff, 0x1})
r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3a61b5c, 0x0)
prctl$PR_SET_UNALIGN(0x6, 0x3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)=<r3=>0x0)
ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000380))
fcntl$setown(r2, 0x8, r3)
r4 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0)
read(r4, 0x0, 0x0)
r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0)
r6 = dup2(r4, r5)
readv(r6, &(0x7f0000000100)=[{&(0x7f0000000280)=""/250, 0xfa}], 0x1)
fcntl$lock(0xffffffffffffffff, 0x25, 0x0)

18:20:35 executing program 0:
bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x1cb, &(0x7f0000000000), 0x0, 0xdd4d}, 0x28)
r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0)
getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f00000000c0)=0x4)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={<r1=>0x0, 0x2, 0x20}, &(0x7f00000001c0)=0xc)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)={r1, 0x1, 0x6, [0xfffffffffffffffe, 0x1, 0x8000, 0x10000, 0x5, 0x10001]}, &(0x7f0000000240)=0x14)

[  280.539354] FAULT_INJECTION: forcing a failure.
[  280.539354] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[  280.552274] CPU: 0 PID: 9166 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  280.559296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  280.568649] Call Trace:
[  280.571255]  dump_stack+0x172/0x1f0
[  280.574909]  should_fail.cold+0xa/0x1b
[  280.578817]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  280.583944]  ? ___might_sleep+0x163/0x280
[  280.588162]  should_fail_alloc_page+0x50/0x60
[  280.592672]  __alloc_pages_nodemask+0x1a1/0x710
[  280.597357]  ? __alloc_pages_slowpath+0x2900/0x2900
[  280.602391]  ? __lock_acquire+0x53b/0x4700
[  280.606638]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  280.612229]  alloc_pages_current+0x107/0x210
[  280.616683]  pte_alloc_one+0x1b/0x1a0
[  280.620505]  __do_fault+0x2b9/0x4e0
[  280.624140]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  280.629690]  __handle_mm_fault+0x2cbd/0x3f20
[  280.634131]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  280.638985]  ? find_held_lock+0x35/0x130
[  280.643059]  ? handle_mm_fault+0x322/0xb30
[  280.647320]  ? kasan_check_read+0x11/0x20
[  280.651480]  handle_mm_fault+0x43f/0xb30
[  280.655640]  __get_user_pages+0x7b6/0x1a40
[  280.659898]  ? follow_page_mask+0x19a0/0x19a0
[  280.664413]  ? memset+0x32/0x40
[  280.667706]  populate_vma_page_range+0x20d/0x2a0
[  280.672493]  __mm_populate+0x204/0x380
[  280.676395]  ? populate_vma_page_range+0x2a0/0x2a0
[  280.681344]  do_shmat+0xd50/0x1090
[  280.684902]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  280.689666]  ? fput+0x128/0x1a0
[  280.692960]  __x64_sys_shmat+0xd1/0x170
[  280.696941]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  280.701708]  ? do_shmat+0x1090/0x1090
[  280.705535]  ? lockdep_hardirqs_on+0x415/0x5d0
[  280.710123]  ? trace_hardirqs_on+0x67/0x230
[  280.714454]  do_syscall_64+0x103/0x610
[  280.718351]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  280.723541] RIP: 0033:0x457e39
[  280.726751] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  280.745658] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  280.753368] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  280.760638] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  280.767914] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  280.775189] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
[  280.782463] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
[  280.804151] protocol 88fb is buggy, dev hsr_slave_0
[  280.809632] protocol 88fb is buggy, dev hsr_slave_1
18:20:35 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x48f, &(0x7f0000000040)={0x6, @multicast1, 0x0, 0x0, 'wrr\x00'}, 0x2c)
openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0)

18:20:35 executing program 1 (fault-call:1 fault-nth:9):
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:35 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer\x00', 0x2, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400})
r1 = socket$rds(0x15, 0x5, 0x0)
setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x4000007, 0x0, 0x0)
sendto$packet(0xffffffffffffffff, &(0x7f00000024c0), 0x0, 0x40800, 0x0, 0x0)

18:20:35 executing program 2 (fault-call:1 fault-nth:7):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:35 executing program 4:
clone(0x10040000, 0x0, 0x0, 0x0, 0x0)
r0 = msgget(0xffffffffffffffff, 0x0)
msgctl$IPC_STAT(r0, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0)
ioctl$IOC_PR_RESERVE(r1, 0x401070c9, &(0x7f0000000140)={0x2, 0x7fff, 0x1})
r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3a61b5c, 0x0)
prctl$PR_SET_UNALIGN(0x6, 0x3)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)=<r3=>0x0)
ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000380))
fcntl$setown(r2, 0x8, r3)
r4 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x200, 0x0)
read(r4, 0x0, 0x0)
r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0)
r6 = dup2(r4, r5)
readv(r6, &(0x7f0000000100)=[{&(0x7f0000000280)=""/250, 0xfa}], 0x1)
fcntl$lock(0xffffffffffffffff, 0x25, 0x0)

18:20:35 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000})
ioctl$KVM_RUN(r4, 0xae80, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)
keyctl$session_to_parent(0x12)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt(0xffffffffffffffff, 0x9, 0x1, &(0x7f0000000140), 0x0)
close(r1)
socket$kcm(0x2, 0x5, 0x2)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000040), 0x1c)

[  281.102897] FAULT_INJECTION: forcing a failure.
[  281.102897] name failslab, interval 1, probability 0, space 0, times 0
[  281.125103] FAULT_INJECTION: forcing a failure.
[  281.125103] name failslab, interval 1, probability 0, space 0, times 0
[  281.154565] CPU: 1 PID: 9183 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  281.161605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  281.170966] Call Trace:
[  281.173568]  dump_stack+0x172/0x1f0
[  281.177212]  should_fail.cold+0xa/0x1b
[  281.181118]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  281.186229]  ? lock_downgrade+0x810/0x810
[  281.190392]  ? ___might_sleep+0x163/0x280
[  281.194550]  __should_failslab+0x121/0x190
[  281.198801]  should_failslab+0x9/0x14
[  281.202607]  kmem_cache_alloc+0x2be/0x710
[  281.206762]  ? __lock_acquire+0x53b/0x4700
[  281.211003]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  281.216558]  ptlock_alloc+0x20/0x70
[  281.220192]  pte_alloc_one+0x6d/0x1a0
[  281.223998]  __do_fault+0x2b9/0x4e0
[  281.227625]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  281.233168]  __handle_mm_fault+0x2cbd/0x3f20
[  281.237588]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  281.242438]  ? find_held_lock+0x35/0x130
[  281.246503]  ? handle_mm_fault+0x322/0xb30
[  281.250769]  ? kasan_check_read+0x11/0x20
[  281.254931]  handle_mm_fault+0x43f/0xb30
[  281.259000]  __get_user_pages+0x7b6/0x1a40
[  281.263256]  ? follow_page_mask+0x19a0/0x19a0
[  281.267769]  ? memset+0x32/0x40
[  281.271060]  populate_vma_page_range+0x20d/0x2a0
[  281.275829]  __mm_populate+0x204/0x380
[  281.279732]  ? populate_vma_page_range+0x2a0/0x2a0
[  281.284683]  do_shmat+0xd50/0x1090
[  281.288237]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  281.293000]  ? fput+0x128/0x1a0
[  281.296298]  __x64_sys_shmat+0xd1/0x170
[  281.300282]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  281.305044]  ? do_shmat+0x1090/0x1090
[  281.308850]  ? lockdep_hardirqs_on+0x415/0x5d0
[  281.313438]  ? trace_hardirqs_on+0x67/0x230
[  281.317767]  do_syscall_64+0x103/0x610
[  281.321668]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  281.326856] RIP: 0033:0x457e39
[  281.330052] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
18:20:35 executing program 0:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
r2 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
r3 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26)
ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/40)
setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8)
ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e)
sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0)
bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41)
ioctl(0xffffffffffffffff, 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)

[  281.348952] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  281.356661] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  281.363930] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  281.371202] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  281.378475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
[  281.385759] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
[  281.414354] CPU: 0 PID: 9188 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60
[  281.421404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  281.430768] Call Trace:
[  281.433374]  dump_stack+0x172/0x1f0
[  281.437023]  should_fail.cold+0xa/0x1b
[  281.440926]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  281.446044]  ? lock_downgrade+0x810/0x810
[  281.450204]  ? ___might_sleep+0x163/0x280
[  281.454368]  __should_failslab+0x121/0x190
[  281.458617]  should_failslab+0x9/0x14
[  281.462429]  kmem_cache_alloc+0x2be/0x710
[  281.466597]  ? kasan_check_read+0x11/0x20
[  281.470766]  ? do_raw_spin_unlock+0x57/0x270
[  281.475190]  key_alloc+0x428/0x1100
[  281.479337]  ? key_user_put+0x70/0x70
[  281.483154]  key_create_or_update+0x5f6/0xba0
[  281.487662]  ? key_type_lookup+0xf0/0xf0
[  281.491749]  ? lock_downgrade+0x810/0x810
[  281.495925]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  281.501470]  __x64_sys_add_key+0x2bd/0x4f0
[  281.505714]  ? key_get_type_from_user.constprop.0+0x110/0x110
[  281.511617]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  281.516380]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  281.521761]  ? lockdep_hardirqs_on+0x415/0x5d0
[  281.526349]  ? trace_hardirqs_on+0x67/0x230
[  281.530681]  do_syscall_64+0x103/0x610
[  281.534577]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  281.539773] RIP: 0033:0x457e39
[  281.542965] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  281.561868] RSP: 002b:00007f06f6b49c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[  281.569756] RAX: ffffffffffffffda RBX: 00007f06f6b49c90 RCX: 0000000000457e39
[  281.577026] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140
[  281.584294] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000
[  281.591563] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f06f6b4a6d4
[  281.598834] R13: 00000000004bdd6b R14: 00000000004ce088 R15: 0000000000000003
18:20:36 executing program 2 (fault-call:1 fault-nth:8):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:36 executing program 1 (fault-call:1 fault-nth:10):
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:36 executing program 0:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
r2 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
r3 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26)
ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/40)
setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8)
ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e)
sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0)
bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41)
ioctl(0xffffffffffffffff, 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)

[  281.868453] FAULT_INJECTION: forcing a failure.
[  281.868453] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  281.886568] FAULT_INJECTION: forcing a failure.
[  281.886568] name failslab, interval 1, probability 0, space 0, times 0
[  281.894540] CPU: 1 PID: 9211 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  281.904780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  281.914130] Call Trace:
[  281.916737]  dump_stack+0x172/0x1f0
[  281.920380]  should_fail.cold+0xa/0x1b
[  281.924279]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  281.929391]  ? ___might_sleep+0x163/0x280
[  281.933555]  should_fail_alloc_page+0x50/0x60
[  281.938058]  __alloc_pages_nodemask+0x1a1/0x710
[  281.942768]  ? __save_stack_trace+0x8a/0xf0
[  281.947099]  ? __alloc_pages_slowpath+0x2900/0x2900
[  281.952129]  ? __lock_acquire+0x53b/0x4700
[  281.956372]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  281.961918]  alloc_pages_current+0x107/0x210
[  281.966332]  pte_alloc_one+0x1b/0x1a0
[  281.970131]  __do_fault+0x2b9/0x4e0
[  281.973760]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  281.979301]  __handle_mm_fault+0x2cbd/0x3f20
[  281.983714]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  281.988562]  ? find_held_lock+0x35/0x130
[  281.992622]  ? handle_mm_fault+0x322/0xb30
[  281.996868]  ? kasan_check_read+0x11/0x20
[  282.001018]  handle_mm_fault+0x43f/0xb30
[  282.005080]  __get_user_pages+0x7b6/0x1a40
[  282.009321]  ? follow_page_mask+0x19a0/0x19a0
[  282.013822]  ? memset+0x32/0x40
[  282.017109]  populate_vma_page_range+0x20d/0x2a0
[  282.021870]  __mm_populate+0x204/0x380
[  282.025760]  ? populate_vma_page_range+0x2a0/0x2a0
[  282.030702]  do_shmat+0xd50/0x1090
[  282.034267]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  282.039021]  ? fput+0x128/0x1a0
[  282.042305]  __x64_sys_shmat+0xd1/0x170
[  282.046281]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  282.051078]  ? do_shmat+0x1090/0x1090
[  282.054881]  ? lockdep_hardirqs_on+0x415/0x5d0
[  282.059463]  ? trace_hardirqs_on+0x67/0x230
[  282.063789]  do_syscall_64+0x103/0x610
[  282.067686]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  282.072873] RIP: 0033:0x457e39
[  282.076063] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  282.094968] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  282.102673] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  282.109939] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  282.117206] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  282.124472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
[  282.131742] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
[  282.154602] CPU: 1 PID: 9212 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60
[  282.161637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  282.170989] Call Trace:
[  282.173586]  dump_stack+0x172/0x1f0
[  282.177221]  should_fail.cold+0xa/0x1b
[  282.181149]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  282.186265]  ? lock_downgrade+0x810/0x810
[  282.190422]  ? ___might_sleep+0x163/0x280
[  282.194586]  __should_failslab+0x121/0x190
[  282.198832]  should_failslab+0x9/0x14
[  282.202639]  __kmalloc_track_caller+0x2d8/0x740
[  282.207308]  ? key_alloc+0x428/0x1100
[  282.207324]  ? rcu_read_lock_sched_held+0x110/0x130
[  282.207338]  ? kmem_cache_alloc+0x341/0x710
[  282.207351]  ? key_alloc+0x481/0x1100
[  282.207370]  kmemdup+0x27/0x60
[  282.207386]  key_alloc+0x481/0x1100
[  282.207412]  ? key_user_put+0x70/0x70
[  282.207433]  key_create_or_update+0x5f6/0xba0
[  282.239478]  ? key_type_lookup+0xf0/0xf0
[  282.243553]  ? lock_downgrade+0x810/0x810
[  282.247742]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  282.253289]  __x64_sys_add_key+0x2bd/0x4f0
[  282.257539]  ? key_get_type_from_user.constprop.0+0x110/0x110
[  282.263438]  ? trace_hardirqs_on_thunk+0x1a/0x1c
18:20:36 executing program 2 (fault-call:1 fault-nth:9):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:37 executing program 4:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
r2 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
r3 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26)
ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/40)
setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8)
ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e)
sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0)
bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41)
ioctl(0xffffffffffffffff, 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)

[  282.268202]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  282.273580]  ? lockdep_hardirqs_on+0x415/0x5d0
[  282.278171]  ? trace_hardirqs_on+0x67/0x230
[  282.278192]  do_syscall_64+0x103/0x610
[  282.278209]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  282.291576] RIP: 0033:0x457e39
[  282.294776] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
18:20:37 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer\x00', 0x2, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400})
r1 = socket$rds(0x15, 0x5, 0x0)
setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x4000007, 0x0, 0x0)
sendto$packet(0xffffffffffffffff, &(0x7f00000024c0), 0x0, 0x40800, 0x0, 0x0)

[  282.313675] RSP: 002b:00007f06f6b49c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[  282.313691] RAX: ffffffffffffffda RBX: 00007f06f6b49c90 RCX: 0000000000457e39
[  282.313700] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140
[  282.313709] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000
[  282.313726] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f06f6b4a6d4
[  282.313736] R13: 00000000004bdd6b R14: 00000000004ce088 R15: 0000000000000003
18:20:37 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:37 executing program 0:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer\x00', 0x2, 0x0)
r0 = socket(0x10, 0x803, 0x0)
sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0)
recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400})
r1 = socket$rds(0x15, 0x5, 0x0)
setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, 0x0, 0x0)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x4000007, 0x0, 0x0)
sendto$packet(0xffffffffffffffff, &(0x7f00000024c0), 0x0, 0x40800, 0x0, 0x0)

18:20:37 executing program 1 (fault-call:1 fault-nth:11):
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:37 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x2020)

[  282.961574] FAULT_INJECTION: forcing a failure.
[  282.961574] name failslab, interval 1, probability 0, space 0, times 0
[  282.973771] CPU: 1 PID: 9242 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60
[  282.980797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  282.990146] Call Trace:
[  282.992746]  dump_stack+0x172/0x1f0
[  282.996384]  should_fail.cold+0xa/0x1b
[  283.000278]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  283.005384]  ? lock_downgrade+0x810/0x810
[  283.009533]  ? ___might_sleep+0x163/0x280
[  283.013688]  __should_failslab+0x121/0x190
[  283.017930]  should_failslab+0x9/0x14
[  283.021737]  kmem_cache_alloc_trace+0x2d1/0x760
[  283.026407]  ? rcu_read_lock_sched_held+0x110/0x130
[  283.031424]  ? __kmalloc_track_caller+0x5d1/0x740
[  283.036275]  selinux_key_alloc+0x4b/0x1b0
[  283.040430]  security_key_alloc+0x7d/0xc0
[  283.044583]  key_alloc+0x7d8/0x1100
[  283.048220]  ? key_user_put+0x70/0x70
[  283.052033]  key_create_or_update+0x5f6/0xba0
[  283.056533]  ? key_type_lookup+0xf0/0xf0
[  283.060598]  ? lock_downgrade+0x810/0x810
[  283.064765]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  283.070304]  __x64_sys_add_key+0x2bd/0x4f0
[  283.074542]  ? key_get_type_from_user.constprop.0+0x110/0x110
[  283.080430]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  283.085213]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  283.090582]  ? lockdep_hardirqs_on+0x415/0x5d0
[  283.095180]  ? trace_hardirqs_on+0x67/0x230
[  283.099526]  do_syscall_64+0x103/0x610
[  283.103418]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  283.108605] RIP: 0033:0x457e39
[  283.111798] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  283.130699] RSP: 002b:00007f06f6b28c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[  283.138414] RAX: ffffffffffffffda RBX: 00007f06f6b28c90 RCX: 0000000000457e39
[  283.145678] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140
[  283.153032] RBP: 000000000073bfa0 R08: fffffffffffffffe R09: 0000000000000000
[  283.160297] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f06f6b296d4
[  283.167563] R13: 00000000004bdd6b R14: 00000000004ce088 R15: 0000000000000003
18:20:38 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000})
ioctl$KVM_RUN(r4, 0xae80, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)
keyctl$session_to_parent(0x12)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt(0xffffffffffffffff, 0x9, 0x1, &(0x7f0000000140), 0x0)
close(r1)
socket$kcm(0x2, 0x5, 0x2)

18:20:38 executing program 1 (fault-call:1 fault-nth:12):
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:38 executing program 4:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
r2 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
r3 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26)
ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/40)
setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8)
ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e)
sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0)
bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41)
ioctl(0xffffffffffffffff, 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)

18:20:38 executing program 5:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
r2 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
r3 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26)
ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/40)
setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8)
ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e)
sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0)
bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41)
ioctl(0xffffffffffffffff, 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)

18:20:38 executing program 0:
perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = socket$nl_xfrm(0x10, 0x3, 0x6)
r2 = socket$inet6_udp(0xa, 0x2, 0x0)
connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c)
r3 = socket$l2tp(0x18, 0x1, 0x1)
connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x26)
ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/40)
setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8)
ioctl$DRM_IOCTL_SET_MASTER(0xffffffffffffffff, 0x641e)
sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0)
bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0x41)
ioctl(0xffffffffffffffff, 0x0, 0x0)
openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0)
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)

18:20:38 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4002)

[  283.599029] FAULT_INJECTION: forcing a failure.
[  283.599029] name failslab, interval 1, probability 0, space 0, times 0
18:20:38 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4006)

18:20:38 executing program 4:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4002)

18:20:38 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000})
ioctl$KVM_RUN(r4, 0xae80, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)
keyctl$session_to_parent(0x12)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt(0xffffffffffffffff, 0x9, 0x1, &(0x7f0000000140), 0x0)
close(r1)
socket$kcm(0x2, 0x5, 0x2)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000040), 0x1c)

[  283.723958] CPU: 0 PID: 9261 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60
[  283.731017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  283.740369] Call Trace:
[  283.742973]  dump_stack+0x172/0x1f0
[  283.746627]  should_fail.cold+0xa/0x1b
[  283.750531]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  283.755641]  ? lock_downgrade+0x810/0x810
[  283.759794]  ? ___might_sleep+0x163/0x280
[  283.763963]  __should_failslab+0x121/0x190
[  283.768215]  should_failslab+0x9/0x14
[  283.772032]  __kmalloc+0x2dc/0x740
[  283.775586]  ? lock_acquire+0x16f/0x3f0
[  283.775612]  ? __key_instantiate_and_link+0x3c/0x3b0
[  283.775626]  ? encrypted_instantiate+0x157/0x947
[  283.775644]  encrypted_instantiate+0x157/0x947
[  283.794046]  ? __mutex_lock+0x3cd/0x1310
[  283.798124]  ? datablob_hmac_verify+0x310/0x310
[  283.802811]  ? mutex_trylock+0x1e0/0x1e0
[  283.806887]  ? do_raw_spin_unlock+0x57/0x270
[  283.811309]  ? key_alloc+0xa38/0x1100
[  283.815139]  __key_instantiate_and_link+0xd7/0x3b0
[  283.820082]  key_create_or_update+0x62f/0xba0
[  283.824593]  ? key_type_lookup+0xf0/0xf0
[  283.828676]  ? lock_downgrade+0x810/0x810
[  283.832854]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  283.838414]  __x64_sys_add_key+0x2bd/0x4f0
[  283.842663]  ? key_get_type_from_user.constprop.0+0x110/0x110
[  283.848558]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  283.853323]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  283.858698]  ? lockdep_hardirqs_on+0x415/0x5d0
[  283.863309]  ? trace_hardirqs_on+0x67/0x230
[  283.867650]  do_syscall_64+0x103/0x610
18:20:38 executing program 4:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4002)

[  283.871735]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  283.876932] RIP: 0033:0x457e39
[  283.880134] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  283.899038] RSP: 002b:00007f06f6b49c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[  283.899054] RAX: ffffffffffffffda RBX: 00007f06f6b49c90 RCX: 0000000000457e39
[  283.899063] RDX: 0000000020000100 RSI: 0000000020000180 RDI: 0000000020000140
[  283.899072] RBP: 000000000073bf00 R08: fffffffffffffffe R09: 0000000000000000
[  283.899086] R10: 00000000000000ca R11: 0000000000000246 R12: 00007f06f6b4a6d4
[  283.935830] R13: 00000000004bdd6b R14: 00000000004ce088 R15: 0000000000000003
18:20:38 executing program 4:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4002)

18:20:38 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x200000)

18:20:39 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000})
ioctl$KVM_RUN(r4, 0xae80, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)
keyctl$session_to_parent(0x12)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt(0xffffffffffffffff, 0x9, 0x1, &(0x7f0000000140), 0x0)
close(r1)

18:20:39 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000440)=@filter={'filter\x00', 0xe, 0x1, 0x1d0, [0x0, 0x20000200, 0x20000230, 0x20000260], 0x0, 0x0, &(0x7f0000000200)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'veth0\x00', 'bcsf0\x00', 'veth1_to_team\x00', 'bcsf0\x00', @random="cd5ad268fd92", [], @dev, [], 0x108, 0x108, 0x140, [@physdev={'physdev\x00', 0x70, {{'gretap0\x00', {0xff}, 'team0\x00', {}, 0x11}}}]}}, @common=@dnat={'dnat\x00', 0x10, {{@empty, 0xffffffffffffffff}}}}]}]}, 0x248)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070")
ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, 0x0)
ioctl$VIDIOC_S_STD(0xffffffffffffffff, 0x40085618, 0x0)
r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400000, 0x0)
ioctl$KDDELIO(r1, 0x4b35, 0x1)

18:20:39 executing program 0:
mkdir(&(0x7f0000000200)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0)
openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0)
exit_group(0x200)
r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0)
lseek(r0, 0x3, 0x0)

18:20:39 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x907000)

18:20:39 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  284.821693] encrypted_key: master key parameter 'user:' is invalid
18:20:39 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='\nncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:39 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xa05000)

18:20:39 executing program 0:
syz_execute_func(&(0x7f0000000180)="93cd808000006969ef69dc00d98adcd0d00fd1b02db5d900000070e4c653fb0fcdcce39aa95ff965be3c3b4d4d408064797f419fdf400e01efff2a9dc402053a9b0000002067450f483b1c0a1a63460fc476c16161787896040498e1b1ac8f0f0000009f")

[  284.869679] x_tables: eb_tables: physdev.0 match: invalid size 72 (kernel) != (user) 112
[  284.903234] x_tables: eb_tables: physdev.0 match: invalid size 72 (kernel) != (user) 112
18:20:39 executing program 5:
rename(0x0, &(0x7f00000000c0)='./file0\x00')
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40000004, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x77827170)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='bcsf0\x00', 0x10)
ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79})
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
sendfile(r2, r3, 0x0, 0xb02)
ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"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"})
r4 = msgget(0xffffffffffffffff, 0x0)
msgrcv(r4, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x1, 0x1, 0x3000)
r5 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x425f, 0xfffffffffffffffc, 0x0, 0xfe2f)
ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_PIT(r2, 0x8048ae66, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={<r6=>0x0}, &(0x7f0000000080)=0xc)
ioctl$TIOCNXCL(r0, 0x540d)
ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f0000000200)={{0x7, 0x6, 0x0, 0x3, 'syz0\x00', 0x8}, 0x3, 0x30, 0x7ff, r6, 0x0, 0x50df, 'syz1\x00', 0x0, 0x0, [], [0xffffffffffffff1f, 0x3, 0x3f, 0x7]})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
prctl$PR_SVE_GET_VL(0x33, 0xa691)

18:20:39 executing program 4:
r0 = syz_init_net_socket$llc(0x1a, 0x8000000000001, 0x0)
r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000080)={<r2=>0x0, 0x2}, &(0x7f00000000c0)=0x8)
getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000100)={r2, @in={{0x2, 0x4e21, @multicast1}}, 0x0, 0x9, 0x2, 0x8001, 0x200}, &(0x7f00000001c0)=0x98)
bind$llc(r0, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x10)
bind$llc(r0, 0x0, 0x0)

18:20:39 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='%ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:39 executing program 2:
mlockall(0x2)
r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000080))
r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
ioctl$TIOCNOTTY(r1, 0x5422)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x4, 0x4)
r2 = shmget$private(0x0, 0x2000, 0xfc, &(0x7f0000002000/0x2000)=nil)
shmctl$IPC_STAT(r2, 0x2, &(0x7f00000000c0)=""/14)
ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000100)=0x6)

18:20:40 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='.ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:40 executing program 4:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xa05000)

18:20:40 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x4000c2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000240)={<r1=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x2}}, 0x18)

18:20:40 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)
keyctl$session_to_parent(0x12)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt(0xffffffffffffffff, 0x9, 0x1, &(0x7f0000000140), 0x0)

18:20:40 executing program 4:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xa05000)

18:20:40 executing program 0:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet(0x2, 0x4000000000000001, 0x0)
r1 = socket(0x11, 0x2, 0x0)
r2 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
ioctl$NBD_SET_SOCK(r2, 0xab00, r1)
r3 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r3, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080), 0x0)
getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2)
r4 = accept$alg(r3, 0x0, 0x0)
sendmmsg$alg(r4, &(0x7f0000000040), 0x0, 0x0)
readv(r4, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0x250}], 0x1)
ioctl$NBD_CLEAR_SOCK(r2, 0xab03)
fcntl$setsig(r3, 0xa, 0x1a)

18:20:40 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200042, 0x0)
ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f00000001c0)={0x100000001, "151a6b5fa45edc8708505b40610dc90d627d1adc0bd8a56e099ff6622e9d005f", 0x400, 0x6, 0x400, 0x5, 0x7})
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0xe9, 0x0, &(0x7f0000000080)="a654a206c222b561f4b556f5834eb2459152e72bd534c040e6481c1537d8a87d367517b86fd10b303e05cf02d7ac3e1e9522ebd20db25b19cfbd924f78775a68154bc25fcab855ec3e049fa98d678e31183b402d3f589885c681b759670f4647d22120a0b24d3f83d83b7d4df185764a2cdb3038fae3c410f2f08c212962746bedd4f85592e3aeacfe3b8ea5f6a4a6fa7dd5c50ae9f566f0cb0b7b52d821f97b53d5420491dc426aed947f1adc17e19fd1c389e59bad695f6870898f51b49b9274a2f0e618cb15ff5247543df599953327991e2fe5caf05d5e294f0ffca558029167ff67591778184d"})

18:20:40 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='e\ncrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:41 executing program 5:
rename(0x0, &(0x7f00000000c0)='./file0\x00')
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40000004, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x77827170)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='bcsf0\x00', 0x10)
ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000480)={0x79})
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
sendfile(r2, r3, 0x0, 0xb02)
ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000001940)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c341a35eb0f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250df3613c25d2789c869c9cc95a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2dee1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093f04000000663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"})
r4 = msgget(0xffffffffffffffff, 0x0)
msgrcv(r4, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x1, 0x1, 0x3000)
r5 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x425f, 0xfffffffffffffffc, 0x0, 0xfe2f)
ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$KVM_SET_PIT(r2, 0x8048ae66, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={<r6=>0x0}, &(0x7f0000000080)=0xc)
ioctl$TIOCNXCL(r0, 0x540d)
ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f0000000200)={{0x7, 0x6, 0x0, 0x3, 'syz0\x00', 0x8}, 0x3, 0x30, 0x7ff, r6, 0x0, 0x50df, 'syz1\x00', 0x0, 0x0, [], [0xffffffffffffff1f, 0x3, 0x3f, 0x7]})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
prctl$PR_SVE_GET_VL(0x33, 0xa691)

18:20:41 executing program 4:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xa05000)

18:20:41 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='e%crypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:41 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x100)
r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x1a1640, 0x0)
bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, r1, 0x9, 0x3}, 0x10)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  286.251026] block nbd0: Receive control failed (result -22)
[  286.278214] block nbd0: Device being setup by another task
18:20:41 executing program 4:
r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80, 0x0)
ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f00000000c0))
r1 = socket$inet6(0xa, 0x80002, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x2, 0x0, 0x0, 0x8, 0x0, 0xffffffff}, 0x20)

[  286.345256] block nbd0: shutting down sockets
18:20:41 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='en\nrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:41 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
shmget$private(0x0, 0x3000, 0x0, &(0x7f0000001000/0x3000)=nil)

18:20:41 executing program 0:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet(0x2, 0x4000000000000001, 0x0)
r1 = socket(0x11, 0x2, 0x0)
r2 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
ioctl$NBD_SET_SOCK(r2, 0xab00, r1)
r3 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r3, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080), 0x0)
getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2)
r4 = accept$alg(r3, 0x0, 0x0)
sendmmsg$alg(r4, &(0x7f0000000040), 0x0, 0x0)
readv(r4, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0x250}], 0x1)
ioctl$NBD_CLEAR_SOCK(r2, 0xab03)
fcntl$setsig(r3, 0xa, 0x1a)

18:20:41 executing program 4:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040))
syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, <r0=>0xffffffffffffffff, 0x0, 0xb, &(0x7f00000000c0)='syzka\x00\x00\x00\x05\x00\xf3', <r1=>0x0}, 0x30)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r1, 0x4)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x90)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000008000)=ANY=[@ANYBLOB="850000002200000007000000000000009500000000000020"], &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0x3a, 0x0, &(0x7f0000000280)="e460cdfbef24080000000a9386dd6a00000000072feb3014cd3ec8000000e8d5000000010000001400000500242f09880bd320d98a61a9002100", 0x0, 0x401}, 0x28)

18:20:41 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)
keyctl$session_to_parent(0x12)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)

18:20:41 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='en%rypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:41 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='enc\nypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  287.082850] block nbd0: Receive control failed (result -22)
[  287.154407] block nbd0: shutting down sockets
18:20:42 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070")
r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x7, 0x80)
ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f00000001c0)=0x1)
syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x2, 0x2)
r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0)
syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405)
r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000040)={0x9, 0x4, 0xc000000000000000})
openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/validatetrans\x00', 0x1, 0x0)
ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0x6)

18:20:42 executing program 4:
r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00')
ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000180)={{0x0, 0x3, 0x7, 0x3, 0x5}, 0x8, 0x9, 0x4})
fcntl$setstatus(r0, 0x4, 0x40c00)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
close(r1)
r3 = socket$inet6(0xa, 0x80002, 0x88)
bind$inet6(r3, &(0x7f0000000040)={0xa, 0x10000000004e20}, 0x1c)
syz_emit_ethernet(0x83, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd601bfc97004d8800fe800000000f00000000000000000000ff02000000000000000000f3059e210100004e20004d9078e29607149378d33ea0263b37921db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0)
ioctl$LOOP_SET_FD(r0, 0x4c00, r2)
io_setup(0x8, &(0x7f0000000100)=<r4=>0x0)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f0000000180)}, 0x10)
io_submit(r4, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000040)="ffefffffff7f000001", 0x9}])

18:20:42 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='enc%ypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:42 executing program 2:
mlockall(0x2)
r0 = socket$inet_dccp(0x2, 0x6, 0x0)
fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:fonts_t:s0\x00', 0x1d, 0x2)

18:20:42 executing program 0:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x1, 0x80002, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000040)='%d')
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8db, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000000c0)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x9140625323d3980e, &(0x7f00000005c0), 0x0, &(0x7f0000000780), 0xfffffff8}, 0x0)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0)
r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r3)
socket$kcm(0x2, 0x3, 0x2)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N')
r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801})
ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000140))
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)='\x00')
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='%d')
r5 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x4e401)
ioctl$CAPI_REGISTER(r5, 0x400c4301, &(0x7f0000000200)={0x7fff, 0x10000, 0x85})

[  287.328059] audit: type=1400 audit(1549477242.102:70): avc:  denied  { relabelto } for  pid=9428 comm="syz-executor2" name="DCCP" dev="sockfs" ino=34825 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:fonts_t:s0 tclass=dccp_socket permissive=1
18:20:42 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encr\npted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:42 executing program 2:
mlockall(0x2)
r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x80, 0x0)
ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x9, 0xf38, 0x72, 0x10001, 0x3, 0x7fff})
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:42 executing program 5:
r0 = memfd_create(&(0x7f0000000580)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b<zP\xf5\x96\xb0*5\xa2\xd6\xf2Ym\x13\xf1qj\x14\x9e\x9d\xee\xd9X\xf7{b\xab\a6m\xd2%\xebL\x1f\xb3m\xde\xddUC\x984ZZ\xc4\n\t\xd3\x0eO\xa1\xbc)\xb0n\xe85\xa0\x95\t8\x95\f\xa3\xca\xea\xe8^\xcbj\x1d\xc5\x17!\xf0`\xefHz\xddl\xa7\xc3\xcb\xcfM\xc9\xde\xechl\x11\x81\xca2\xe4\x1e\x006\xc61\xda\xa8\x87PQ5,\xba\x87\xda,\xc3\xf3-Xl\x12\x8aY\xa7\x9f\xa2-3\xe9\x1a6\xecj\xa3\x12\xea4\xbb\x99\'|9I\x9e\x05u\xe5\b\xd8\x1a_\xd3\xbaRY\xfbgp\xf62\x8a\xd9\x8c\xd8\xb4\xa1\x1fr o\"@\xa4\xaf\xf1V\xf9\xccYV\xb7A\xc0\xc4\x97\x0f\x1dtl\x99\xd0\x12:s\xe7a .e_P\xfb\x86]\xc6R?2\xfbT\xc7\x17\xa0k\xe3\x9c\xf2!\x86u\xa1\xe7RCz\x05\x17\x87\x99\xca\xa2\xffo\xff\x83j\xe3M+>R\xc7M,\xce\xec\x13%aqVZ\x90\x8f\xed\xe2\xd0\xa3>]\xf8\xa9\xc5Lp\tzw\x01Yni\xf0s\xc2\xde\xdcU\a\x1a\xa3\x85t\x1eg2\aQ,0j%\xa5,\xbb\xc0\xe4\x9c\xaa\x8e\xab\xd0)\x19\"u\xb0m\xa3(\xe7pn3|\xb4X:\x80\x8e5r+\xb7V\x8f\xd6Z\x9d\xd6+H\xae\x9e$#\x16\xeaC/\x87\xe1\x97\xf1\x00\"\xa0\xffm\xbf\xc4\xa4\xcf}\x81\x9ch,}\x00f3\x1ba\x05V\xe7\xfa\x89TJ%W\xf5\xe0i\x12:N\xf9|@\xd9\xa7\xc04\xf9l86\xfb\\i\x9fE\x1d\xe6y\xe0\x8c\x8b\x87\x9c8\xa6\x9c\x16\x85rUaj\xf4$\xa9\x1b\xc9r\x90\x97\xa4\xe4~#u\xa8\x03B\r\xf8K\x98\a\xe1\xc19\xb6U\xd3\xbb\x13H\xac\xb1\xe7\xf2\x1cgu\xf1Ui \xf5\xfd\xc9Q\xa5\xd2\x13\x133\xc5\xeceK\xb3j\xd2\x14\f\xb4\tko\xa6L\xc7n\xc9\xa2\xe6\x13\x9d]\xa1\\\x96\xbb\x89\xf4\x9f\x14\x10\xd8\xf7\xaa\x16\x95m\x06\x19\xe7mUZ:\x7fq~p\vq\xdfZgFA\x05\x14\x13', 0x0)
write$binfmt_misc(r0, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xfffffe43)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
lseek(r1, 0x8000000000000001, 0x8)
r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x4000, 0x0)
shutdown(r2, 0x0)

18:20:42 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encr%pted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  287.704793] device nr0 entered promiscuous mode
[  288.139419] audit: type=1400 audit(1549477242.912:71): avc:  denied  { sys_ptrace } for  pid=9451 comm="ps" capability=19  scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1
18:20:43 executing program 2:
mlockall(0x2)
r0 = shmget(0x1, 0x1000, 0x8, &(0x7f0000001000/0x1000)=nil)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x2000)

18:20:43 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encry\nted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:43 executing program 4:
r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x88000, 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x5, 0x40})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000280)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88)
setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast2}}}, 0x108)
setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f0000000400)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast1}}}, 0x108)

18:20:43 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)
keyctl$session_to_parent(0x12)

18:20:43 executing program 2:
r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2)
ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000040)={{0x80, 0xffff}, 0x0, 0xc69a, 0x100000001, {0x8, 0x7fffffff}, 0x6, 0x7d1c090b})
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:43 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encry%ted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:43 executing program 4:
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={<r1=>0xffffffffffffffff})
keyctl$set_reqkey_keyring(0xe, 0x3)
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4)
shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil)
r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xffffffffffffffff)
keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000100)='blacklist\x00', 0x0)
r3 = socket$inet(0x2, 0x1, 0x0)
pipe(0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
bind$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10)
getitimer(0x0, 0x0)
sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10)
fcntl$dupfd(r1, 0x406, r0)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000240))
request_key(0x0, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(0x0, 0x0, 0x0, 0xffffffffffffff62, 0x0)
openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r5 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0)
dup(0xffffffffffffffff)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x2)
ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0)
r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,')
sendfile(r3, r6, &(0x7f0000000080), 0x80000003)

18:20:43 executing program 0:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair(0x1, 0x80002, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000040)='%d')
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8db, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000000c0)=@pppol2tpv3in6={0x2, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x9140625323d3980e, &(0x7f00000005c0), 0x0, &(0x7f0000000780), 0xfffffff8}, 0x0)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0)
r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r3)
socket$kcm(0x2, 0x3, 0x2)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N')
r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x801})
ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000140))
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)='\x00')
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='%d')
r5 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x4e401)
ioctl$CAPI_REGISTER(r5, 0x400c4301, &(0x7f0000000200)={0x7fff, 0x10000, 0x85})

18:20:43 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encryp\ned\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:43 executing program 2:
mlockall(0x2)
r0 = shmget(0x0, 0x3000, 0x44, &(0x7f0000002000/0x3000)=nil)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xc01, 0x0)
ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000040)={0x3f, "00f364b6efb4d071c7682abf8dd50cad5271454d529d06e3e0301ad0b585a801", 0x5, 0x500, 0x3, 0xac2a, 0xd, 0x2, 0x4013, 0xe})

[  288.992089] device nr0 entered promiscuous mode
18:20:43 executing program 5:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0)
pipe(&(0x7f00000000c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100))
r3 = socket$packet(0x11, 0x20000000000003, 0x300)
getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @loopback}, &(0x7f0000000180)=0xc)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'team_slave_1\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000200)={@remote, <r4=>0x0}, &(0x7f0000000240)=0x14)
ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000002c0)={'lo\x00\x00\x00\x00\x02\x00', <r5=>r4})
setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x1)
setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r5, 0x3, 0x6, @dev}, 0x10)

18:20:43 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encryp%ed\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:43 executing program 4:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00')
socket$nl_generic(0x10, 0x3, 0x10)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', <r2=>0x0})
sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000017740)={0x58, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0xe}, {0x8}}}]}}]}, 0x58}}, 0x0)

[  289.144406] device lo entered promiscuous mode
18:20:43 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypt\nd\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  289.166341] audit: type=1400 audit(1549477243.942:72): avc:  denied  { ioctl } for  pid=9516 comm="syz-executor4" path="socket:[34009]" dev="sockfs" ino=34009 ioctlcmd=0x8933 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  289.174972] device lo left promiscuous mode
18:20:44 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x1000)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0)
r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x40008, 0x80000000488100)
ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0))
ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000040)=0x7)
ioctl$LOOP_SET_FD(r0, 0x4c00, r0)

[  289.320682] netlink: 'syz-executor4': attribute type 3 has an invalid length.
[  289.683630] protocol 88fb is buggy, dev hsr_slave_0
[  289.688807] protocol 88fb is buggy, dev hsr_slave_1
[  289.700831] device lo entered promiscuous mode
[  289.712655] netlink: 'syz-executor4': attribute type 3 has an invalid length.
[  289.734966] device lo left promiscuous mode
18:20:44 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000})
ioctl$KVM_RUN(r3, 0xae80, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:44 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypt%d\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:44 executing program 4:
clock_getres(0x2, 0x0)

18:20:44 executing program 2:
r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x4, 0x400800)
ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000000c0)=""/119)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4040, 0x0)
ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)={0x4, 0x100000001})

18:20:44 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil)
r2 = shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x4000)
mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000)
shmctl$IPC_RMID(r1, 0x0)
shmdt(r2)

18:20:44 executing program 5:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r0, &(0x7f000000b000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000240)=@newsa={0x13c, 0x10, 0x721, 0x0, 0x0, {{@in, @in6=@dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x500]}, 0x0, 0x0, 0x0, 0x0, 0x3}, {@in=@broadcast, 0x0, 0x833}, @in6=@empty={[0xa]}, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x13c}}, 0x0)
socket$pppoe(0x18, 0x1, 0x0)

18:20:44 executing program 4:
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0)
writev(r0, &(0x7f0000000900)=[{&(0x7f0000000080)='\r', 0x1}], 0x1)
ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000140))
getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={<r1=>0x0, 0x1460, 0x30, 0x2, 0x10000}, &(0x7f0000000040)=0x18)
setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1, 0x9}, 0x8)

18:20:44 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypt.d\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:44 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypte\n\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:44 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
socket(0x0, 0x2, 0x8)
bind$alg(r0, &(0x7f0000000480)={0x26, 'skcipher\x00', 0x0, 0x0, 'ofb(blowfish)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="939a36a4", 0x4)
socketpair(0x9, 0x806, 0x0, &(0x7f0000000000))

18:20:44 executing program 2:
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x1000)

18:20:44 executing program 0:
r0 = socket$netlink(0x10, 0x3, 0x0)
setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0)
ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'nr0\x00', &(0x7f00000001c0)=@ethtool_eeprom={0xb}})

18:20:45 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypte%\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:45 executing program 4:
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
writev(r0, &(0x7f0000001600)=[{&(0x7f0000000180)="91ff94a27d4d3f8f25f8ba0b82d2c56c7d1c455d897ba16ed8c5658fa442979c6a33bede5ee9f9dfe95f887386b76cf09f008ab084d3967c33f8bb48d7c39646acbec7403bd46783d008792b7c9f2a374ffdb7488e63c7b52e0b121e5cc6839705ac15c005109853219902fa0d1b1daac7d52869437ab8b3006d6ea33c7e9099d4d1448f8d2c2b2591b1468f9ab92b3b49dbf379126770325ed6c686d4b66bdf421b8239342927290ee2114f7922983f5d1bf976f494807439f184486b72ce1b08ee92525abc955a782c8b9578fd5dd6ff9eb7fd258bbeee626ce3", 0xdb}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="3fa7c6cc5a2d6aa56336f4440c", 0xd}, {&(0x7f00000012c0)="9eaa2327a94d60e8aa0ae62ec0b1a7762851f32de52193f16b60774dd61259e7948941e2a6c8b952907afbb6fb", 0x2d}, {&(0x7f0000001300)="36899dfcbeb6fa4881b07255e43cc85e6f5cf97d6c612daa0ea0058e1b44173ea326c85a0d0316b15ece8077a57e956b4afa96e48765d19316c5ac95e6e9e22f26ab87b422a9b9cdb556bbbb200601", 0x4f}, {&(0x7f0000001380)="8a6b42b88dd15926b3ee3cdf2ba23061615cec4354ec455a7748c98a099cf25c21b13f668f0210736a4c0b0a83372ddfe218b40b4a9da3d5116dd10ea2b7538eb08e1a030314937423bb8dcef8e46570ad7f0f01539c02d80188188130d82bda79ae4cce1c77a805b44023e321db7732b4fde659c81f3bde1c4fc08104509856900d94235995983536e0e70964195d210135d4a21bb8707bba6a5a206027791b47a0f2365e2b87763cbd8b994c80856232ba0af3755dbef812d6221f52940d581817945215520b932e058001e1c7", 0xce}, {&(0x7f0000001480)="b22074bfc0a5f516651a3744c902850332016da6ac9a5dfc3c39a63dda89341f63655ce1fb7e826668df3ace9b1f30786ee7ccc918c1087d0b9615bd61faf2d5795347f44334da124fc0affeca1ae2457e67f5efe0c29c887da846fe0330eb252ddbbcb7ec5db2e1db5668a1e20bae30310e525e1a9ffe79bdefd41f6b9558ddfece0ee59e84fe68075ec77783a942ef", 0x90}, {&(0x7f0000001540)="0313c0680ffe5cdec093ddb3d23fbaaf4420b06b12e1c5cf7ef5efb3913358009d97068d5f354a043b70ba16b08695187a1264b64798f6790e6b8da7bdea8ef60fc7a564c45f8654a15e706216ccea3ee9c15aee499d7d7e9049ac6957c9ed7c601b1acda8e99d4e2d913cd4247245fff77989ffd83a0f472f7f71db543900815d6aca8b23d716c2ae6c1af5b2e853955e120c12aad2", 0x96}], 0x8)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2000, 0x0)
close(r2)
r3 = fcntl$dupfd(r0, 0x0, r2)
r4 = syz_genetlink_get_family_id$team(&(0x7f00000016c0)='team\x00')
getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000001700)={@broadcast, @initdev, <r5=>0x0}, &(0x7f0000001740)=0xc)
fsetxattr$trusted_overlay_upper(r2, &(0x7f0000004380)='trusted.overlay.upper\x00', &(0x7f00000043c0)={0x0, 0xfb, 0xe9, 0x1, 0x7, "d87b26f7374be7c7636155cc9f4f57b4", "4f0860d6da090edbf0a77ded076af32832ad387d063d35b0ba67770945f7ecaf0b50849ba2cd3595ec7c018d77404e1dd74ec1a80777828399ce1dfd482e1a2f8223a309c564ca6fccc9d46ea9ea5bae8d10819c5d7864642b1d5a4284a6b718e2f04f3825eb2c4bd43d3176c77c696a57046d1e60ea712018409f8f0f9013ad7a1def2df83d4e46af2c27118a689e389f7e859f679038760778312a6943637f0ae61a6e6514a9affe9a121bf97c647e59bf6eb6a5074576dddf103bbee784a3a2536d51c60e586a4f595ad6d8b0c99b7553a968"}, 0xe9, 0x0)
ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001780)={'team0\x00', <r6=>0x0})
recvmmsg(r0, &(0x7f0000003f40)=[{{0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f00000017c0)=""/220, 0xdc}, {&(0x7f00000018c0)=""/205, 0xcd}, {&(0x7f00000019c0)=""/246, 0xf6}, {&(0x7f0000001ac0)=""/119, 0x77}, {&(0x7f0000001b40)=""/136, 0x88}, {&(0x7f0000001c00)=""/165, 0xa5}], 0x6, &(0x7f0000001d40)=""/230, 0xe6}, 0xff}, {{&(0x7f0000001e40)=@tipc=@name, 0x80, &(0x7f0000002280)=[{&(0x7f0000001ec0)=""/124, 0x7c}, {&(0x7f0000001f40)=""/137, 0x89}, {&(0x7f0000002000)=""/129, 0x81}, {&(0x7f00000020c0)=""/152, 0x98}, {&(0x7f0000002180)=""/213, 0xd5}], 0x5, &(0x7f0000002300)=""/52, 0x34}, 0x1ff}, {{&(0x7f0000002340)=@tipc=@name, 0x80, &(0x7f0000002480)=[{&(0x7f00000023c0)=""/154, 0x9a}], 0x1}, 0x80000001}, {{&(0x7f00000024c0)=@can={0x1d, <r7=>0x0}, 0x80, &(0x7f0000002740)=[{&(0x7f0000002540)=""/192, 0xc0}, {&(0x7f0000002600)=""/65, 0x41}, {&(0x7f0000002680)=""/128, 0x80}, {&(0x7f0000002700)=""/57, 0x39}], 0x4}, 0xebd2}, {{0x0, 0x0, &(0x7f00000029c0)=[{&(0x7f0000002780)=""/3, 0x3}, {&(0x7f00000027c0)=""/184, 0xb8}, {&(0x7f0000002880)=""/2, 0x2}, {&(0x7f00000028c0)=""/164, 0xa4}, {&(0x7f0000002980)=""/28, 0x1c}], 0x5, &(0x7f0000002a40)=""/175, 0xaf}, 0x401}, {{&(0x7f0000002b00)=@ax25={{0x3, @bcast}, [@default, @rose, @netrom, @default, @default, @remote, @rose, @bcast]}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002b80)=""/209, 0xd1}], 0x1, &(0x7f0000002cc0)=""/229, 0xe5}, 0x80000000}, {{&(0x7f0000002dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000002e40)=""/7, 0x7}, {&(0x7f0000002e80)=""/15, 0xf}, {&(0x7f0000002ec0)=""/4096, 0x1000}, {&(0x7f0000003ec0)=""/5, 0x5}], 0x4}, 0x4}], 0x7, 0x10020, &(0x7f0000004100)={0x77359400})
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000004140)={@mcast2, <r8=>0x0}, &(0x7f0000004180)=0x14)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000041c0)={@loopback, <r9=>0x0}, &(0x7f0000004200)=0x14)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004240)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000004340)=0xe8)
getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004500)={<r11=>0x0, @broadcast, @local}, &(0x7f0000004540)=0xc)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000045c0)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r12=>0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f00000046c0)=0xe8)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000004580)={r3, 0x10, &(0x7f00000044c0)={&(0x7f0000004740)=""/131, 0x83, <r13=>0xffffffffffffffff}}, 0x10)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004800)=r13, 0x4)
ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000004700)={'team0\x00', <r14=>0x0})
getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004840)={<r15=>0x0, @rand_addr, @dev}, &(0x7f0000006b40)=0xc)
getpeername$packet(0xffffffffffffff9c, &(0x7f0000006b80)={0x11, 0x0, <r16=>0x0}, &(0x7f0000006bc0)=0x14)
getpeername$packet(0xffffffffffffffff, &(0x7f0000006c00)={0x11, 0x0, <r17=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000006c40)=0x14)
sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f00000071c0)={&(0x7f0000001680)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000007180)={&(0x7f0000006c80)={0x4c4, r4, 0x1, 0x70bd2a, 0x25dfdbff, {}, [{{0x8, 0x1, r5}, {0xb8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r6}, {0x164, 0x2, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x2, 0x7, 0x655, 0x2}, {0x1, 0x7, 0x3ff, 0x2}, {0x8, 0x80000001, 0x1, 0xffffffff}, {0xfffffffffffffa69, 0x6, 0x61, 0x7}, {0x6, 0x9, 0x7ff, 0x81}, {0x7, 0x4, 0x3f, 0x5}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x6, 0xe8, 0x100000000, 0x81}, {0x3, 0xe1, 0x5, 0x3}]}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r9}, {0x22c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1f6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r15}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0x48, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x800, 0x7fff, 0x2, 0x5}, {0x3, 0x7ff, 0x1, 0x6}]}}}]}}]}, 0x4c4}, 0x1, 0x0, 0x0, 0x800}, 0x11)
r18 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0)
ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f0000004880)={<r19=>0x0})
ioctl$BINDER_GET_NODE_DEBUG_INFO(r3, 0xc018620b, &(0x7f00000048c0)={<r20=>0x0})
ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000004a40)={0x4c, 0x0, &(0x7f0000004900)=[@acquire, @increfs_done={0x40106308, r19, 0x4}, @request_death={0x400c630e, 0x0, 0x1}, @acquire={0x40046305, 0x4}, @register_looper, @increfs_done={0x40106308, r20}], 0x97, 0x0, &(0x7f0000004980)="049aec1310b9b666d7d22fd60d78a2d01325969e4791569faed6b137ab4f28af351c37cb6ec714d0606e1783fba1c6d9dfd6cd5c4febb0d4d597f928906d6838bbdcfa17d7219aaae2b62f1efd5b7c9d76f948550466cc766d8f4e403701fe782d5f18d27fb90603920611006e6235693347e04218cd3a409e9d05e8c9b06a5dccea77e27af4df4f975bc73394003eccfea02285cba1d1"})
ioctl$VIDIOC_RESERVED(r18, 0x5601, 0x0)
r21 = dup2(r2, r2)
ioctl$sock_SIOCGPGRP(r21, 0x8904, &(0x7f0000000080)=<r22=>0x0)
write$P9_RGETLOCK(r21, &(0x7f0000000100)={0x1e, 0x37, 0x1, {0x3, 0x80000001, 0x5b, r22}}, 0x1e)
ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'lo\x00', 0x200})

18:20:45 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800)
getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000040)={<r1=>0x0, @in6={{0xa, 0x4e24, 0x3, @rand_addr="52eb3be0c845a18cda29a396548b6c45", 0x3}}, 0x200, 0x6e659191, 0x1, 0x2, 0x2}, &(0x7f0000000100)=0x98)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={<r2=>0x0, 0x9}, &(0x7f0000000180)=0x8)
getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r1, 0x6803000, 0x1, 0x7f, 0x6, 0xffffffffffff8001, 0x7fff, 0xd302, {r2, @in6={{0xa, 0x4e22, 0x5, @empty, 0xffff}}, 0x6, 0x0, 0x20, 0x3, 0xff}}, &(0x7f0000000280)=0xb0)

18:20:45 executing program 0:
r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r5 = openat$cgroup_int(r4, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r5, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r7 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r5)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={<r8=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r9=>r8, r3, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r9)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r2, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)
write$binfmt_misc(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="5300000044a6aeabec2e020017000000014078404d0816141508000000001384139ffa00000040000008000000006eef4799ec00000000b8188e23061291cdaf72dd9a000092c682730e590849d92a873dd353"], 0x53)

18:20:45 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000006c0)="0af51f023c123f3188a070")
unshare(0x400)
r1 = socket(0x15, 0x80005, 0x0)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c)
getpeername$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x10)

18:20:45 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:45 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x02', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:45 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)
ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000000100)={0x12, 0x0, &(0x7f0000000040)="25f8ad0490bbef20ff351bb80ea127d501fba00ee97874d47b78d77e9817bc98fba9e8434263068045dadf0ea3109c54b7572bca19fb118d61cc46ef9d6eb3cccf0657af2fa2f319447bbc376c9c8d52b7c1b288de223bce3decef9bd297104ac3822193036adac1dc183518ef026f4a8a8f035fd324271049d64a2d279b68645d363a2d1a6557df8b17c730aae42b8c1594e2fe1d885951fe3c9938f036d1c21917a48c68b3", {0x5, 0x100000000, 0x3247504d, 0x3, 0x2, 0x7, 0x0, 0xa3d4}})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

18:20:45 executing program 2:
mlockall(0x7)
shmget$private(0x0, 0x3000, 0x54000042, &(0x7f0000ffc000/0x3000)=nil)
shmget(0x3, 0xe000, 0x421, &(0x7f0000002000/0xe000)=nil)
shmget(0x1, 0x2000, 0x0, &(0x7f000000f000/0x2000)=nil)
r0 = shmget$private(0x0, 0x4000, 0x1000, &(0x7f0000ffc000/0x4000)=nil)
shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x1000)
r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0)
write$capi20_data(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="100005000583320004000000000000007300e5746bc42b85511676bc1d77a8081280b045de8b1b5255d0a0e622bc52471ed155f241149b5a518e8d96b19f1ffa2b71987f5cd2517085b372379ac2832b6dc870108d13416af64f490b92c88c4b6f63ee8d466e983e8de5d9d67d4a8a1a33bc82f0813bfc9dbe5481f93bce84d903dd9a41de3fc33cb0"], 0x85)
ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x7}, {0x7, 0x20}, {0x5, 0x6}]})

18:20:46 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x03', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  291.371176] sg_write: process 208 (syz-executor0) changed security contexts after opening file descriptor, this is not allowed.
18:20:46 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x04', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:46 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:46 executing program 0:
r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r5 = openat$cgroup_int(r4, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r5, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r7 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r5)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={<r8=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r9=>r8, r3, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r9)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r2, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)
write$binfmt_misc(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="5300000044a6aeabec2e020017000000014078404d0816141508000000001384139ffa00000040000008000000006eef4799ec00000000b8188e23061291cdaf72dd9a000092c682730e590849d92a873dd353"], 0x53)

18:20:46 executing program 4:
r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r5 = openat$cgroup_int(r4, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r5, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r7 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r5)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={<r8=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r9=>r8, r3, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r9)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r2, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)
write$binfmt_misc(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="5300000044a6aeabec2e020017000000014078404d0816141508000000001384139ffa00000040000008000000006eef4799ec00000000b8188e23061291cdaf72dd9a000092c682730e590849d92a873dd353"], 0x53)

18:20:46 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x05', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:46 executing program 2:
mlockall(0x2)
r0 = shmat(0x0, &(0x7f0000001000/0x4000)=nil, 0x7000)
shmdt(r0)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x40004000)
r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000040)=0x3ff)

18:20:46 executing program 0:
r0 = socket$bt_rfcomm(0x1f, 0x7ffffffffffffffd, 0x3)
recvmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f0000000680)=""/37, 0x25}, {&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f0000000700)=""/26, 0x1a}], 0x6, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x3, &(0x7f0000000bc0)=""/189, 0xbd}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f}, 0x7}, {{&(0x7f0000000f40)=@sco, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000fc0)=""/157, 0x9d, 0x9}}, {{&(0x7f00000012c0)=@l2, 0x80, &(0x7f0000001340)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x6}, 0xfffffffffffffffa}, {{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002540)=""/88, 0x58}], 0x2, &(0x7f0000002600)=""/4096, 0x1000, 0x400}, 0x4}], 0x6, 0x102, &(0x7f0000003b00))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r2, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10)
r3 = accept$alg(r2, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={<r4=>0x0, 0x7}, &(0x7f0000000080)=0x8)
write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000007c0)={0xa0, 0x0, 0x4, {{0x1, 0x2, 0x10000, 0x0, 0x6, 0x6, {0x3, 0x6, 0x100000000000, 0xfffffffffffffffc, 0x80, 0x4, 0x7fff, 0x6d81, 0x22d, 0x10000, 0x5, 0x0, 0x0, 0x47}}, {0x0, 0x2}}}, 0xa0)
getsockname$unix(0xffffffffffffffff, &(0x7f0000000880), &(0x7f0000000140)=0x6e)
recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfd4a}], 0x3ed, &(0x7f00000011c0)=""/157, 0x3d09}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400})
r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={r4, 0x77, "38febb8d25ee22ed0371abd3abbc5b2de7230c43c5fc3e1f568b28afb36e230e6965b44b6bcc0ccf612778bbaaa392ef02d27013855703109c4b0a5a198db8884a449ac95b99a0b516fd66c5a5d3b489f66a72c6b7627434472453c66feaae640f771ac405f595c9ecd20a28fc9584e44cd0a72f909dfe"}, &(0x7f00000000c0)=0x7f)
ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000240))
sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[]}}, 0x0)
r6 = socket$inet6(0xa, 0x2, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(r5, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="8500000000000000000000000000000010000000000000000000000000000000000000af0e5d5c7003080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a505416bca16bae4a210fa1336ff3ad44409752ff83b00000000000000000000000000"])
connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8041)

18:20:46 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x06', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:46 executing program 4:
r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r5 = openat$cgroup_int(r4, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r5, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r7 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r5)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={<r8=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r9=>r8, r3, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r9)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r2, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)
write$binfmt_misc(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="5300000044a6aeabec2e020017000000014078404d0816141508000000001384139ffa00000040000008000000006eef4799ec00000000b8188e23061291cdaf72dd9a000092c682730e590849d92a873dd353"], 0x53)

18:20:47 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)
ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000000100)={0x12, 0x0, &(0x7f0000000040)="25f8ad0490bbef20ff351bb80ea127d501fba00ee97874d47b78d77e9817bc98fba9e8434263068045dadf0ea3109c54b7572bca19fb118d61cc46ef9d6eb3cccf0657af2fa2f319447bbc376c9c8d52b7c1b288de223bce3decef9bd297104ac3822193036adac1dc183518ef026f4a8a8f035fd324271049d64a2d279b68645d363a2d1a6557df8b17c730aae42b8c1594e2fe1d885951fe3c9938f036d1c21917a48c68b3", {0x5, 0x100000000, 0x3247504d, 0x3, 0x2, 0x7, 0x0, 0xa3d4}})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

18:20:47 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x1)

18:20:47 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\a', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:47 executing program 2:
r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff)
getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=<r1=>0x0, &(0x7f0000000040)=0x4)
setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r1, 0x7}, 0x8)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:48 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000440)=[@text16={0x10, &(0x7f0000000400)="66b8010000000f01c1baf80c66b8f8a2e28366efbafc0c66b8dd52aa7966ef6436f2a40f30dbd07c800f2169650f019d64d90f214d0f01df", 0x38}], 0x1, 0x0, &(0x7f0000000200), 0x10000000000000e2)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:48 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted`', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:48 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0)
r1 = getpgrp(0xffffffffffffffff)
ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000080)={{0x9, 0x2, 0xffffffffffffffff, 0x4f64, 'syz0\x00', 0x3}, 0x1, 0x30, 0x4, r1, 0x5, 0x8, 'syz1\x00', &(0x7f0000000040)=['\x00', '\x02systemP)\r\x00', '\x00', '\\cgroup\xfc&\x00', '^\x00'], 0x19, [], [0x2, 0xfe92, 0x7, 0x1000]})

18:20:48 executing program 0:
r0 = socket$bt_rfcomm(0x1f, 0x7ffffffffffffffd, 0x3)
recvmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f0000000680)=""/37, 0x25}, {&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f0000000700)=""/26, 0x1a}], 0x6, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x3, &(0x7f0000000bc0)=""/189, 0xbd}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f}, 0x7}, {{&(0x7f0000000f40)=@sco, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000fc0)=""/157, 0x9d, 0x9}}, {{&(0x7f00000012c0)=@l2, 0x80, &(0x7f0000001340)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x6}, 0xfffffffffffffffa}, {{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002540)=""/88, 0x58}], 0x2, &(0x7f0000002600)=""/4096, 0x1000, 0x400}, 0x4}], 0x6, 0x102, &(0x7f0000003b00))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r2, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10)
r3 = accept$alg(r2, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={<r4=>0x0, 0x7}, &(0x7f0000000080)=0x8)
write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000007c0)={0xa0, 0x0, 0x4, {{0x1, 0x2, 0x10000, 0x0, 0x6, 0x6, {0x3, 0x6, 0x100000000000, 0xfffffffffffffffc, 0x80, 0x4, 0x7fff, 0x6d81, 0x22d, 0x10000, 0x5, 0x0, 0x0, 0x47}}, {0x0, 0x2}}}, 0xa0)
getsockname$unix(0xffffffffffffffff, &(0x7f0000000880), &(0x7f0000000140)=0x6e)
recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfd4a}], 0x3ed, &(0x7f00000011c0)=""/157, 0x3d09}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400})
r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={r4, 0x77, "38febb8d25ee22ed0371abd3abbc5b2de7230c43c5fc3e1f568b28afb36e230e6965b44b6bcc0ccf612778bbaaa392ef02d27013855703109c4b0a5a198db8884a449ac95b99a0b516fd66c5a5d3b489f66a72c6b7627434472453c66feaae640f771ac405f595c9ecd20a28fc9584e44cd0a72f909dfe"}, &(0x7f00000000c0)=0x7f)
ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000240))
sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[]}}, 0x0)
r6 = socket$inet6(0xa, 0x2, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(r5, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="8500000000000000000000000000000010000000000000000000000000000000000000af0e5d5c7003080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a505416bca16bae4a210fa1336ff3ad44409752ff83b00000000000000000000000000"])
connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8041)

18:20:48 executing program 4:
r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r5 = openat$cgroup_int(r4, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r5, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r5, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r7 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r5)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580)={<r8=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r9=>r8, r3, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r9)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r2, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)
write$binfmt_misc(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="5300000044a6aeabec2e020017000000014078404d0816141508000000001384139ffa00000040000008000000006eef4799ec00000000b8188e23061291cdaf72dd9a000092c682730e590849d92a873dd353"], 0x53)

18:20:48 executing program 5:
r0 = socket$bt_rfcomm(0x1f, 0x7ffffffffffffffd, 0x3)
recvmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f0000000680)=""/37, 0x25}, {&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f0000000700)=""/26, 0x1a}], 0x6, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x3, &(0x7f0000000bc0)=""/189, 0xbd}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f}, 0x7}, {{&(0x7f0000000f40)=@sco, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000fc0)=""/157, 0x9d, 0x9}}, {{&(0x7f00000012c0)=@l2, 0x80, &(0x7f0000001340)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x6}, 0xfffffffffffffffa}, {{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002540)=""/88, 0x58}], 0x2, &(0x7f0000002600)=""/4096, 0x1000, 0x400}, 0x4}], 0x6, 0x102, &(0x7f0000003b00))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r2, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10)
r3 = accept$alg(r2, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={<r4=>0x0, 0x7}, &(0x7f0000000080)=0x8)
write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000007c0)={0xa0, 0x0, 0x4, {{0x1, 0x2, 0x10000, 0x0, 0x6, 0x6, {0x3, 0x6, 0x100000000000, 0xfffffffffffffffc, 0x80, 0x4, 0x7fff, 0x6d81, 0x22d, 0x10000, 0x5, 0x0, 0x0, 0x47}}, {0x0, 0x2}}}, 0xa0)
getsockname$unix(0xffffffffffffffff, &(0x7f0000000880), &(0x7f0000000140)=0x6e)
recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfd4a}], 0x3ed, &(0x7f00000011c0)=""/157, 0x3d09}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400})
r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={r4, 0x77, "38febb8d25ee22ed0371abd3abbc5b2de7230c43c5fc3e1f568b28afb36e230e6965b44b6bcc0ccf612778bbaaa392ef02d27013855703109c4b0a5a198db8884a449ac95b99a0b516fd66c5a5d3b489f66a72c6b7627434472453c66feaae640f771ac405f595c9ecd20a28fc9584e44cd0a72f909dfe"}, &(0x7f00000000c0)=0x7f)
ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000240))
sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[]}}, 0x0)
r6 = socket$inet6(0xa, 0x2, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(r5, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="8500000000000000000000000000000010000000000000000000000000000000000000af0e5d5c7003080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a505416bca16bae4a210fa1336ff3ad44409752ff83b00000000000000000000000000"])
connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8041)

18:20:48 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:48 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3)
ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='veth1\x00')
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)

[  293.530061] encrypted_key: master key parameter 'user:' is invalid
18:20:48 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  293.985197] encrypted_key: master key parameter 'user:' is invalid
18:20:48 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:48 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)

[  294.164896] encrypted_key: master key parameter 'user:' is invalid
18:20:49 executing program 0:
r0 = socket$bt_rfcomm(0x1f, 0x7ffffffffffffffd, 0x3)
recvmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000340)=""/75, 0x4b}, {&(0x7f00000003c0)=""/68, 0x44}, {&(0x7f0000000640)=""/20, 0x14}, {&(0x7f0000000680)=""/37, 0x25}, {&(0x7f00000006c0)=""/13, 0xd}, {&(0x7f0000000700)=""/26, 0x1a}], 0x6, 0x0, 0x0, 0x3}, 0x9}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000940)=""/198, 0xc6}, {&(0x7f0000000a40)=""/103, 0x67}, {&(0x7f0000000ac0)=""/175, 0xaf}], 0x3, &(0x7f0000000bc0)=""/189, 0xbd}, 0x435}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000d80)=""/84, 0x54}], 0x1, &(0x7f0000000e40)=""/63, 0x3f}, 0x7}, {{&(0x7f0000000f40)=@sco, 0x80, &(0x7f0000000e80), 0x0, &(0x7f0000000fc0)=""/157, 0x9d, 0x9}}, {{&(0x7f00000012c0)=@l2, 0x80, &(0x7f0000001340)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x6}, 0xfffffffffffffffa}, {{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000002440)=""/186, 0xba}, {&(0x7f0000002540)=""/88, 0x58}], 0x2, &(0x7f0000002600)=""/4096, 0x1000, 0x400}, 0x4}], 0x6, 0x102, &(0x7f0000003b00))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r2, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10)
r3 = accept$alg(r2, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000000)={<r4=>0x0, 0x7}, &(0x7f0000000080)=0x8)
write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000007c0)={0xa0, 0x0, 0x4, {{0x1, 0x2, 0x10000, 0x0, 0x6, 0x6, {0x3, 0x6, 0x100000000000, 0xfffffffffffffffc, 0x80, 0x4, 0x7fff, 0x6d81, 0x22d, 0x10000, 0x5, 0x0, 0x0, 0x47}}, {0x0, 0x2}}}, 0xa0)
getsockname$unix(0xffffffffffffffff, &(0x7f0000000880), &(0x7f0000000140)=0x6e)
recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x167, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfd4a}], 0x3ed, &(0x7f00000011c0)=""/157, 0x3d09}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400})
r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={r4, 0x77, "38febb8d25ee22ed0371abd3abbc5b2de7230c43c5fc3e1f568b28afb36e230e6965b44b6bcc0ccf612778bbaaa392ef02d27013855703109c4b0a5a198db8884a449ac95b99a0b516fd66c5a5d3b489f66a72c6b7627434472453c66feaae640f771ac405f595c9ecd20a28fc9584e44cd0a72f909dfe"}, &(0x7f00000000c0)=0x7f)
ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000240))
sendmsg$nl_crypto(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f00000006c0)=ANY=[]}}, 0x0)
r6 = socket$inet6(0xa, 0x2, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(r5, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="8500000000000000000000000000000010000000000000000000000000000000000000af0e5d5c7003080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a505416bca16bae4a210fa1336ff3ad44409752ff83b00000000000000000000000000"])
connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c)
syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8041)

18:20:49 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:49 executing program 2:
mlockall(0x8000000000402)
r0 = socket(0x3, 0xf, 0x0)
getsockopt$inet6_udp_int(r0, 0x11, 0x6b, &(0x7f00000001c0), &(0x7f0000000040)=0x4)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00')
sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r1, 0x100, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x4, 0xffffffffffffff90, 0x2b5, 0x80}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000)
r2 = shmget$private(0x0, 0x2000, 0x800000000200, &(0x7f0000001000/0x2000)=nil)
shmat(r2, &(0x7f0000003000/0x4000)=nil, 0x800000004000)

18:20:49 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:49 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)
ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000000100)={0x12, 0x0, &(0x7f0000000040)="25f8ad0490bbef20ff351bb80ea127d501fba00ee97874d47b78d77e9817bc98fba9e8434263068045dadf0ea3109c54b7572bca19fb118d61cc46ef9d6eb3cccf0657af2fa2f319447bbc376c9c8d52b7c1b288de223bce3decef9bd297104ac3822193036adac1dc183518ef026f4a8a8f035fd324271049d64a2d279b68645d363a2d1a6557df8b17c730aae42b8c1594e2fe1d885951fe3c9938f036d1c21917a48c68b3", {0x5, 0x100000000, 0x3247504d, 0x3, 0x2, 0x7, 0x0, 0xa3d4}})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

[  294.796515] encrypted_key: master key parameter 'user:' is invalid
18:20:49 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)

18:20:49 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:49 executing program 2:
r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x10080, 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000100)={{0x7, 0x3}, 'port0\x00', 0x28, 0x820, 0x1f, 0x8001, 0x1ae0, 0x5, 0x7, 0x0, 0x5, 0x1ff})
mlockall(0x2)
r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x20000)
getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:49 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)

[  295.082649] encrypted_key: master key parameter 'user:' is invalid
18:20:49 executing program 2:
mlockall(0x84)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:49 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  295.294288] encrypted_key: master key parameter 'user:' is invalid
18:20:50 executing program 2:
mlockall(0x2)
eventfd2(0x3, 0x800)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:50 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)

18:20:50 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  295.519316] encrypted_key: master key parameter 'user:' is invalid
18:20:50 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)

18:20:50 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:50 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encryptedk', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:50 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)

18:20:50 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c)
readv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/21, 0x15}, {&(0x7f0000000040)=""/208, 0xd0}, {&(0x7f0000000140)=""/187, 0xbb}], 0x3)

18:20:50 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)

18:20:51 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\xff', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:51 executing program 2:
mlockall(0x204)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:51 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)

18:20:51 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:51 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  296.699986] encrypted_key: master key parameter 'user:' is invalid
18:20:51 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:51 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)

[  297.155238] encrypted_key: master key parameter 'user:' is invalid
18:20:52 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:52 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)

18:20:52 executing program 2:
mlockall(0x2)
creat(&(0x7f0000000000)='./file0\x00', 0x5)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:52 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc)

18:20:52 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:52 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x2, 0x0)

[  297.766776] encrypted_key: master key parameter 'user:' is invalid
18:20:52 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:52 executing program 2:
mlockall(0x4)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = semget(0x1, 0x3, 0x30)
r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000080)={<r2=>0x0, 0x2, 0x10}, &(0x7f00000000c0)=0xc)
setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r2, 0x52c7}, 0x8)
accept$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000003c0)=0x14)
semctl$IPC_INFO(r0, 0x6, 0x3, &(0x7f0000000000)=""/35)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000140)="85bc2a12eea8e26aae50bd46e7dae6a07463648faf864ed0d70e8dcd340d4795874d17820095d095a7265fe5cd887041e2fdf4c1a16791ae9b3c001cd17192e52d0fce9e4dcd412da6b84ca3552b05c8284793b5f83b7bfb7699aef35f6d97b10ca85f97c8f0b9e0afc8c1e0d69fb56bcccecfedd3bd89d281cd2e0ef49a7ffec29ba0e07b2e8134909d3d28bc9cfb5fd7f06f1a0ef8e042ac843c12de2ed0a7367fdcd07a2ff018c5e6dd6cb70b3e6743c07dba996a20a0c731ab2fa8e9767d965e6e8d47748c339e90ab1789dad8cb9c7462", &(0x7f0000000240)=""/230}, 0x18)

18:20:52 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc)

18:20:52 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)

[  298.215554] encrypted_key: master key parameter 'user:' is invalid
18:20:53 executing program 2:
mlockall(0x4)
r0 = syz_open_dev$midi(&(0x7f0000001280)='/dev/midi#\x00', 0x400, 0x0)
recvfrom$netrom(r0, &(0x7f00000014c0)=""/4096, 0x1000, 0x2000, 0x0, 0x0)
r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001200)='IPVS\x00')
sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000001480)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001240)={&(0x7f0000001400)={0x4c, r1, 0x302, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x27}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000011}, 0x11)
getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000012c0)={@ipv4={[], [], @local}, 0x80000001, 0x2, 0xff, 0x2, 0x0, 0x3362bf46}, &(0x7f0000001300)=0x20)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x2, &(0x7f0000001180)=[{&(0x7f0000000080)="ddb542256a800cdd7da1584f7292ace032e5e43263f84571478a6b71ccfb91b2c58ac6e06611256e01d23d9aeed454c70a83c054656046d8cf77e19167ccc812af2718a8e57f6dfc19dcf9d79308ac92f8f75a7be7805238e5192004cfc88b00ecddea51c9bd7e0d6d0639754121a6da502de62a5922292e19ccfc55e45d278baee501bc625b17abe9f799196b8d99df34c7c40cca579c5f6e448c0056b00c9a208c15020db093ccf696388a2938975cd47ed2ae5e07f767fef09d6fd6d34218c9a3f4e2b2d98b66743c24f19308", 0xce, 0x100000001}, {&(0x7f0000000180)="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", 0x1000, 0x100000000}], 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB='fsync_mode=strict,usrjquota=,usrjquota=]selinux%securitymime_type@\'{keyringsecuEQprity,grpquota=!proc@,lazytime,active_logs=2,context=staff_u,\x00'])

18:20:53 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:53 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:53 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)

18:20:53 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc)

[  298.633883] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0)
[  298.643775] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock
[  298.672521] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0)
18:20:53 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)

[  298.708165] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock
[  298.717847] encrypted_key: master key parameter 'user:' is invalid
[  298.737496] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0)
18:20:53 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  298.768743] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock
[  298.779588] F2FS-fs (loop2): Magic Mismatch, valid(0xf2f52010) - read(0x0)
[  298.787192] F2FS-fs (loop2): Can't find valid F2FS filesystem in 2th superblock
18:20:53 executing program 2:
r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xc0000, 0x0)
ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040))
uname(&(0x7f0000000180)=""/82)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:53 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  298.903983] encrypted_key: master key parameter 'user:' is invalid
18:20:53 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:53 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)

18:20:54 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)

[  299.380842] encrypted_key: master key parameter 'user:' is invalid
18:20:54 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:54 executing program 2:
mlockall(0x8000001)
r0 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x3c8, 0x148, 0x210, 0x210, 0x210, 0x0, 0x330, 0x330, 0x330, 0x330, 0x330, 0x4, &(0x7f00000002c0), {[{{@uncond, 0x0, 0xe8, 0x148, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x6, 0x2, 0x2}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x3, [0x7fffffff, 0xffffffff, 0x6, 0x81, 0x7, 0xe0e], 0x401, 0x7fff}, {0x7fffffff, [0x1a3, 0x5, 0xfff, 0x1, 0x4], 0x7, 0x5f}}}}, {{@ip={@multicast2, @empty, 0xff0000ff, 0x0, 'irlan0\x00', 'ip_vti0\x00', {0xff}, {0xff}, 0x0, 0x1, 0x7}, 0x0, 0x98, 0xc8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x101}, {0x2, 0x7, 0x9e27}, 0xb25, 0x58149f94}}}, {{@ip={@local, @remote, 0xffffffff, 0xff000000, 'teql0\x00', 'veth0_to_team\x00', {0xff}, {0xff}, 0xaf, 0x3, 0x40}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xd, 0x7, 0x9, 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xff, [0xa9, 0xb, 0x4, 0xfff, 0x1000000, 0x3], 0x101, 0x6}, {0xc3a, [0x6, 0xaf0, 0x500000000000, 0x5, 0x70, 0x53], 0x4, 0x6}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x428)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x100, 0x0)
setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000040)={0x6, {{0x2, 0x4e23, @empty}}}, 0x88)
ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000240))
getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={<r2=>0x0, 0x67b, 0xee}, &(0x7f0000000180)=0x8)
getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={r2, 0x5}, &(0x7f0000000200)=0x8)
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  299.549908] encrypted_key: master key parameter 'user:' is invalid
[  299.686513] Unknown ioctl -1073191904
[  299.693316] Unknown ioctl -1073191904
18:20:54 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:54 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:54 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)

18:20:54 executing program 2:
mlockall(0x2)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x101000, 0x0)
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4a0000, 0x0)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00')
sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:54 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:54 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)

18:20:54 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  299.988852] encrypted_key: master key parameter 'user:' is invalid
18:20:54 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xff, 0x440080)
ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{<r1=>0x0}]})
ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000140)={r1, &(0x7f0000000100)=""/3})
syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x5, 0x400000)

18:20:54 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:55 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  300.172910] encrypted_key: master key parameter 'user:' is invalid
18:20:55 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:55 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  300.419097] encrypted_key: master key parameter 'user:' is invalid
18:20:55 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:55 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:55 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc)

18:20:55 executing program 2:
mlockall(0x2)
r0 = shmget(0x2, 0x6000, 0x54001000, &(0x7f0000003000/0x6000)=nil)
shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x4000)

18:20:55 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:55 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:55 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x7f', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  301.084845] encrypted_key: master key parameter 'user:' is invalid
18:20:55 executing program 2:
r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x602, 0x0)
shmget$private(0x0, 0x1000, 0x54001100, &(0x7f0000003000/0x1000)=nil)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x16)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000040)={0x7b, 0x0, [0x381, 0x4, 0x4543, 0x1]})

18:20:56 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:56 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()

18:20:56 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:56 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  301.558239] encrypted_key: master key parameter 'user:' is invalid
18:20:56 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:56 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)

18:20:56 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:56 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58)
sendmmsg(r0, &(0x7f0000003740)=[{{&(0x7f0000000000)=@sco={0x1f, {0x800, 0x43, 0x0, 0x3, 0x1, 0x401}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000080)="c59478bd3e740e3626b17c4d379ffc73ae72b2a12d9fecf5474b460ab78dac7f5d42e46972330912d854c2b56256873705ae86e57a3f6b5eddf7e220efa53e23ce2ff93c40658173e0", 0x49}, {&(0x7f0000000180)="55c0c45d991dd70fbbe1c4b1b6b7f3306202efba11fcc4f7c48fbc5f74ce3a1ce00275de1fb43618076b989346e70bff4b4cda9a19a0f9191a53efcb44130cf874aa072d8d7142127f3e734cb4263e0e5a4cfd8d1d38305c827ff22b145be0974e4150fd04e83b25520bf003f4aae4891b354c7626e5dea889b2b4113c210b788a8b9f03846e1fe4851b75628fc82f6986bac3a6f20e31649d2cb2405bc6536adc66053bb6a7958e2842df0491ede146112882db7d0ccdbaba7d8754d4154d446c8e9bdcb2769cd35c3c9e2c6993a72b090bca3f6400565c9ae67952d11c3301aa0de4cde9f0", 0xe6}, {&(0x7f0000000280)="44c88577b80384d1abd00632e34f8746a1dcf64a251fab7e7e67969588e7683c0b58491b94ccb7f11553", 0x2a}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="6e73a2b16c52c27df2e9a99b5a9613fd8575a3b55708bf74e0dc852ea792a9d6f5c106cdc131e535e6a971924744ed1f7e46dc1338cff1f7dc4974b91b4111dbf2c75de33c458878d9780b96da906cf3723dc09ec5b4da834486c625f71d6b82d186ce9d3191c8cb4b2c5eb07141bf46996065042c6926204e70434592a5e2d856afc31c743b253a47", 0x89}, {&(0x7f00000013c0)="20e3c2f40a8a8c5939a0a1aebf522d8e6bcb20dd8854c32890853f094557d29e828e289d2b6df4df46aeb2697a4a374ad2aa261ab84a7edd2c6e21eff956e2d8d694bc656eeefdcd99d7bf931a47386a6fa29faf4c9773d62dbf2d24afce037e0f2b6ec9e9652ffcfa6ad3fbdf24fa60759d9969e2de86f8a6df589da262373ba954ac320eccac50cc9116516a712d35b78fc47bae58b69c2b0452f96b5674dbd16110bbe32c84c6a5407d305174", 0xae}], 0x6}, 0x5}, {{&(0x7f0000001500)=@x25={0x9, @remote={[], 0x0}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001580)="5b07889ab836ff76a6c635a6dfa24c54ef4ce4b07e867e9812f7cc6657b6a1c6f77e89c6016ac073829bd77948ac8ad6a624d2ff38706f36f32d4900c26cead00117b00d6277d5d15f8a9a5c41b77f13202705a67ac9e4d92f567c3e8c7ea52479cda345ffbdfc9a0b699c7c2a499c5ae3323cee001a643c4d6b943b9f9dbdcb23d185572d96f557c2508e19dd5515b2989f7fbc77f76abfa6c2f1", 0x9b}, {&(0x7f0000001640)="6d198b128e908ae41274e4c2d6428238d9b5caa649f562334bdf51e3ee343456827a9d6ae70748c5316107eb80b4b983651ffbe1da3c617994f70e11c40f89cc7c8c463309b32d6aba76329966766b037ce623e50aab886e881c82611f26d44d5b669e378e707302191a966a9809d6130b000e771fea2327a9a2281319f824d28bf6ef49e2f8ae04fc214e6aff8cdb379326f49e11329df62bc74143ccbdaf2f56fb69ee68bf1fb7b74b4a2cfc3af79fb55e", 0xb2}, {&(0x7f0000001700)="c2e8553f32b59ccf22d41a2f8aaafab87199ec06a577f50b57c1d0046c4a71eb0fc8d043cb373dfa65487575fb0a5473fc34997bca407ad4bb5bee0d0010b67668308345b974368cb45325dba961b98341b18282f718e06293", 0x59}], 0x3, &(0x7f00000017c0)=[{0x88, 0x116, 0x4, "48154bc890ab544c3471928ea03fbf9891a09daea1b9c56f150e21000faf3f3359a1a4b2da48f8d17697a1d06892c5a8e983a2a313b5f7b6d6a9627a022e4d5f58949a1bd27f643310797572d4b8197dccf321b47256c613d528d956e09f123c49f1a67976423bb8cbcc1c32f356f2f4a42f4a8f"}, {0xd0, 0xbfda9ea6a7a47255, 0x9, "7a6e5286478e0802c60022ed8022af8ee7834aed00a4212da82fe0fb9745d6941b674d7cfa3a116512b712f9e8cce6f9ea43afc5216e1ed78eab36f81885199c445b620d6396fbead337ec7a8944c6660fb64312d24c1c1fdc54ac6ca3d06ff7897a972745be0e18c0c3d9df0655a5430e92cd6bd239fbd1675ffd0a955bb24e951eef11d4107e684b3ddc6b6aad453e39f1725fe82273de903b358cf7caeeaa53d3303d5a79c58b4ac743a41758d100ce4c37f7b96573e7788dee8f0c"}], 0x158}, 0x3f}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000001940)="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", 0x1000}], 0x1, &(0x7f0000002980)=[{0x58, 0x116, 0x401, "58dc9487308dccd370f69b808ec8a6b66a933d5b084b553ff418b1046f64de30608ad3e7c0d0b86210d1f47d563dcf19340afea49af297b7cfef58697d65f2497c8e"}], 0x58}, 0x800}, {{0x0, 0x0, &(0x7f0000002d40)=[{&(0x7f0000002a00)="999a33104a1fc524c269813b0c30803d0f66ce2b451071c0fcb5019fa81e186a13ab33a3bb92832847e722500fc0b1027bc01c178c07dc70d01c27cd8fc39d57d89072423372f86a020e12863c595b3b573d078f4fb71352eca2f140dff5c6f49a12b3992643a05603aba5eb842c1e4c59d6aaf153bd16c3c2287f04c3da671692a59179170e9e6504551ee7819a7ec2c731b6360578942fb95ae7559cbe925c7c89ae84aa83c79db846f1e10fbd83ba2f0935f999e17b464b520e79592092b33e3eb09d3b68b0f711c654891161a2220b8cbdd8a3c80f8e7d52edadb09ed36ff2", 0xe1}, {&(0x7f0000002b00)="dab34447a5ee3e5627ddadb955e93b1f475459c7dddf06892999a613056a94c64bfe0ade4cc983eaaae215721f0486ccc247f336669c8d7522d09d813de0b29cc571bf1ba1a3e9a934470dcf413d1ad530835407da4ddaa9fa05f07d1cb96d03d508f35894a7c5e5591b99815f38fd37b9fcadabccffa04ea5a4ba3cb881199742fa7599f255ecbf7fda884b658b607fa77dba2328f996daaa40d16384878b53282063369186a70ab786b729574d", 0xae}, {&(0x7f0000002bc0)="675d8993ca742590d238b33795e992710f99661a516bf7aaf6c7f347fc3c5db862617db4b2d7b86df4a0b0e0f0c8b290fcbc3ce2c083cebf80850780fced82d1d3724e6a8649ef3b296170adfe7ae29d6a54be9380a2ec865f7b03a9e90de8", 0x5f}, {&(0x7f0000002c40)="f79c5c3c46fb87a6577c02dbec091f8ca7c42e7c3c48a9249c565d46284d7b8bd6b1bcbf1f6b39abbb288a97c4", 0x2d}, {&(0x7f0000002c80)="49755bb53e7a91347cb29e6b85848641777eb275de278a84dce97647187acb76ebbeaa3c3313786ae2c798488cabdecd7599ed8388368bfc331c924848577f2070154e3bad7f26e2c9a287ac5fa7b3ba724ff3f494de98449bf7992e1c112ba6010a4b4aa59a5c434d24a09e175a04903353b95336ce54de8fbaca8f8c0b57d25f98a550b07eeb0d90f13e24384a84628509", 0x92}], 0x5}, 0xfffffffffffffe01}, {{&(0x7f0000002dc0)=@llc={0x1a, 0xffff, 0xc84, 0x28, 0xef, 0x6, @remote}, 0x80, &(0x7f0000002f00)=[{&(0x7f0000002e40)="703977a3896ecb8abaec29a263347f5a319a0d187ad63faa18bcf78d576db86cdf13e53e8d3d4b037e42d660b1fb75ce8466d8f9d2a8d55cdb5c63db06fb8290fd739d9d0546d0810d5bb748e6623a8c36580f9c630865dc4d0126a33a4c4639c8cde666bc099cbbd544dac524958f6cd39353cac53465ccb98b6f4d5b5e948bb6bc1a3e1dd82d6a4bfd1c37a25e0a90", 0x90}], 0x1, &(0x7f0000002f40)=[{0xc0, 0x0, 0x7, "542472d067cf5b15389d28dceb6786d9116f5f9f6632814fe5f445aa8bda5f0691a474204e5d25db189eac5268d53dc7b7024989b8039f5f38f4f6553927c6110bd66732c01d54daf5cb112574bc51ed667a3de05b7ce15fbf34489cb6efc58112de093cd4dd51050b6d7ccc5f51ee6505aad56cedf9cc4217aeff9dc36e23be8bf6a58ff398b45e84718136720b03f4c9b5261ace5cc8981545ab40a42e22c629648b718bc149987c"}, {0xa0, 0x0, 0x8, "cc56034bdd24e7f582fae27d08b5c2c8ffa5e0f5ec903e508fc55751ab0fb02263bc67c06942a2020424622cc0dca1119eaff87a578246017d0ff055e1cd9383ac10168d6ed7fd3d4366150726a6cf6685d522942be2c1e13fefb19859be15daa8f812df4d0e8b16c4b360c750fc2129e92a1552f02c8b1907bd156da1f84f1d5052eec3f7135fa0d4"}, {0xe0, 0x10b, 0x0, "a92818ee9ae5741c3702ca4ebe6a7e1aed326d47cf8aa9a96a10b3ea1c828b68875d872ca964cfa4e00313662029390ecd07300a59423bd1abee0bb9f592b62d3e4d917292c82deaab535f62e3c44029f178a1bff0ce5ef222d311fe8a2c577fd333852236712936829eb5ada746d432300a26ab5cc3498eecfb8fefd6ce193c8f7aef6792b2803ce60c1f6ce942233040ee0d67667efba7814fde037d688e42cf4cfef680ee068366388d72d817df2315d074292a1c5e586c5330e8c91514a983b42a741dcebe51c2"}, {0x38, 0x3b, 0x200000000000000, "be8df1d83b930b5b1471c5f9450a1727d299f73a8d7591b096bcbe691cb660f1e5c14885bbfc57"}], 0x278}}, {{&(0x7f00000031c0)=@isdn={0x22, 0x8000, 0x1, 0x3, 0x3}, 0x80, &(0x7f0000003680)=[{&(0x7f0000003240)="1f72313be5e94848a5e4f8669411f0e9c4597b22f29b08ac6d21ee0f5a7e400aa50a944a876bf3e349a80695a4a6e8b6c2bb3f1b6e31deacca67891d661272656a384af600474553978b02f4d2ae73c17778c80db2fbb49244567e0edf26481fc88cb182a80f82103219d990a9dfdb60959aac3a07365cbc0715915043aa0acaab628ed117c8f44d91d9e7b46db38543a8b8a3825c9f97e4143c2b2eaab289ffb7d763886ae45e68f1ca9172", 0xac}, {&(0x7f0000003300)="b3f971956b17f561d8126a9fc9a0cfcb8111d609afd4b11ac36fdf7aec16de9ce8ecb66f177b312e3ce70d1c4c34c6b8172f8630608e3715eb63b8dd00d6172a524e8003f4bf937edf", 0x49}, {&(0x7f0000003380)="f421275c12a3fbb3f0b338aa12f79cf2e714291d17c1fa1b294dc43657d3bca9acc75c61ec0aee42a638448c3437", 0x2e}, {&(0x7f00000033c0)="24c81f3959c25be7384b620643e97d3ee44098b7c6c31508c5974acc47afdba65569ddc024d4b664e333b48d222134ac5ee2625dddfa0431941083e13ca82623eee339ae40f2c5c050b03f8c6a7554aa3b98ea94562850da7955c8ce4fcf437cfc97096cae6fa2b8c38f6ab43d6037dad641c484ced40f22569024b91b856662b0486736a7fdab96b9750a0ac5b413205e3ccb388ac78bd2fb92e4c86ac5ebdcb0acee376b53f939f0c2bf", 0xab}, {&(0x7f0000003480)="da226e65bc9f655445b2e7c83025bdd5139fb36d542bef466553755fab3f167f16366c2948131b6494ac7873bef2fdcf107fb7ed776a1baeee6f1ee6693afe1e5a7fd8ed64b1221d0e8cef4709416ffb8f42a301e9d77ebb84ff64a2604295296ceaf4a9831c903d6c61f7404e77f1d1f59d744f142de5e153b987f5cc057e3f126b69ad15fc33550f9b4e2c7b5a721b88c8be4ecc26b7591cf7cc9dbcf0022bb781a12feddeb9d43c4d2b43948835700af951234ead509643bf0b57029235d9edaa8f6efc74a4f866a3ff09e3013f405409884a023cfd97e2c21e0a2369109a934688f86830c3588054a63b86", 0xed}, {&(0x7f0000003580)="45bd00399d60d236029208574eebdefc152f86ba779a99f9251002e40f505a12a248d5f4a9645809d7a1517fad4462e804bd513c6c0b0253cfd037d4c89d09a7f15772b6dd4185b1d0aca2d94cd05d9c98b04e826f8840245ec22138a9d819790b705d75d5516791358abe1e84f14e8b47c4095c19195dae1b13377a8ec4fa722942011ffcd29c93322bf575204ec920c516c5d061b82898d107f23108c3", 0x9e}, {&(0x7f0000003640)="269587c4d7f64f7f5d6084844f171bc74f25203bd615faff553b58d2f4772bd6dc49c16846a1", 0x26}], 0x7, &(0x7f0000003700)=ANY=[@ANYBLOB="11000000000000001f010000b6269571"], 0x10}, 0x6}], 0x6, 0x0)
r1 = accept4(r0, 0x0, 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/dev_mcast\x00')
sendfile(r1, r2, 0x0, 0x62)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:56 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:56 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc)
getpriority(0x100080002, 0x0)

[  302.124014] encrypted_key: master key parameter 'user:' is invalid
18:20:57 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:57 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000000c0))
r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x3, 0x42000)
ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000140)=0x7db6f1ba)

18:20:57 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:57 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)

[  302.323718] encrypted_key: master key parameter 'user:' is invalid
18:20:57 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getpriority(0x100080002, 0x0)

18:20:57 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  302.830399] encrypted_key: master key parameter 'user:' is invalid
18:20:57 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:57 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:20:57 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)

18:20:57 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:57 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:20:57 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  303.248059] encrypted_key: master key parameter 'user:' is invalid
18:20:58 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:58 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2000, 0x0)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'ifb0\x00', 0x4}, 0x18)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x80000001, @local, 0x49d78cc0}, @in6={0xa, 0x4e20, 0x3, @mcast1, 0x9}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e23, @broadcast}], 0x78)
ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0)

18:20:58 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)

18:20:58 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  303.482144] encrypted_key: master key parameter 'user:' is invalid
18:20:58 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:58 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  303.763144] encrypted_key: master key parameter 'user:' is invalid
18:20:59 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffff9c, 0x4008af21, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:20:59 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0xc100, 0x0)
setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000003c0)=ANY=[@ANYBLOB="090000000000000002004e23ac1414bb000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e24ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e2300000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004a3855df49635d10d4ae6ee9366c89028fc4cc7f032d97dac88a309fc19e0ca38c228c7280b3ab77ff02d5d754d4024a6032943115e6683c716e7f7f6c457d4e959c0133a72acb1f7d379e698a5b2e9339663b80c24c36691b4c0000000000000000"], 0x1)
pipe(&(0x7f0000000000)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000040)={0x49, 0xd2, 0x2, 0x8001})
prctl$PR_GET_CHILD_SUBREAPER(0x25)
ioctl$TIOCNOTTY(r1, 0x5422)
bind$ax25(r2, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast]}, 0x48)
ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000200)={{0x80000001, 0xf3, 0x4, 0xa652, 0x60a9a724, 0x17a5}, 0x3, 0xffffffff, 0x2, 0x100000001, 0x8, "59c7cc105706e7fc13af7b1270b50160b2f5b65730fba12624e8fc61cb3d8f265938a934eee7830a1961a601201a5d43763ad26fd35d71e1b00fabab8480b8098328d53973f833a66df6ebdf76b0e34d257bb9b665888a924c7bb8885f6b6a0e79d793fdec24b4f28120df399655170bbf845a08768dbc317c76182fb3582428"})

18:20:59 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:59 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)

18:20:59 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:20:59 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)
getpriority(0x100080002, 0x0)

[  304.324379] encrypted_key: master key parameter 'user:' is invalid
18:20:59 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:20:59 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = socket$rxrpc(0x21, 0x2, 0x2)
ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x0, 0x1f, 0x7f, 0x400, 0x7})

18:20:59 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)
getpriority(0x100080002, 0x0)

18:20:59 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  304.513200] encrypted_key: master key parameter 'user:' is invalid
18:20:59 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)

18:20:59 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  304.743371] encrypted_key: master key parameter 'user:' is invalid
18:21:00 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:00 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:00 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:00 executing program 2:
mlockall(0x2)
r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000840)='/dev/cachefiles\x00', 0x400000, 0x0)
ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000740)={0x7ff, 0x5, 0x9})
stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x101, 0x9, &(0x7f00000004c0)=[{&(0x7f0000000080)="2e2d2bcefe13e251ecee8856d9991a490131e8f99c40aecea24dd35cce9bbcfaeadfdc09df1359a61c2630087391ab3e8927ba4171caa362736da98c7f123fbc397f915038b6946a96c96ea2e58a1deeee10bdd34b77aef4c8cd5d75c1a4a2d76e363e0094f318507036dc6f3ca46fe74348a551e35f06d500bce4d5eb1f2d59804a2e9321e21efb3bd57ca5fb48f669bbdc112ef8fd4fa16bd9f4a8dca656c6863201bd040e22a3006046f33bf85262b68dd7c3e6f6696f9a52e3e5bc7996ed9428c43b2ed9ceb6aca4a45a955b75db119e2adbebd462dc8ab0e4c5a259ad0a34eaebf518a8bd33318be0529f48", 0xee, 0x2}, {&(0x7f0000000180)="481620f729f1851c0a6e7d38eb1bb9981860cd6c857c25322029e7144517ac6e79a0988a57185d8caaf489c718258801dc9a769bb3a5da44cbae6c76fc4f920a40c64e5c73562ba999b6933aeaf2f7d09824dc0ba85b90", 0x57, 0x1}, {&(0x7f0000000200)="acae7b2dce3c059ccc14c63b2c9999953d8c55fbd6ca014055a9671199c24eaceee3e2199409279c65facff1eba0cba711bbf1d9de68fda9098adda04d39bae084aa2da1a356434b09622dc56c81eb8f695320e2ff2af6373dd40a488384c4c22ab8e59fa88eeb2e12d51d9f25447c9abfba9fcbdb1a1a5db8afb9ea0c6eba6070eda112146e8520e923673b89620ff7658c809cafaea61a0a68bc68e1081c", 0x9f, 0x9}, {&(0x7f00000002c0)="9095c3be99c2aa20a9b9ac9d4894d267dbb3c3f03f7f1a0ad5b16a2c2030cb0b8b9a154fd7c8acc5a7a5354544256df96476aa51e054f074496b53a46f34fc2e551f68e70ec4", 0x46, 0x4}, {&(0x7f0000000340), 0x0, 0x7}, {&(0x7f0000000380)="95663ae7895bb5eff158787aac79e5dfb0775ace8d099dc090cc", 0x1a}, {&(0x7f00000003c0)="5e8293317e3a249d249e5e0ff06562fc789f578c023c8835ba392f10f7a50d7a125b0d19db5f544c4b118a281bc999d9cccb0b183b3f97376cc4e53094", 0x3d, 0x81}, {&(0x7f0000000400)="15", 0x1, 0x3}, {&(0x7f0000000440)="e1b7b9c2c5561ed03510df6b5b6bb74505e26deacd7d1fc174cb97ffef49d7dd136a569c4d81520b9d4de9eb2b1c321ad0f765733df063db210889a24ef6b0be82ee130ad91bb4665e5e1d8d84d1bc10fc7938f76ca0a206b72e244ac0703d862c1442cf10e044fbd7dd6fafe53070c4b3da4aef8390", 0x76, 0x735}], 0x2, &(0x7f0000000880)=ANY=[@ANYBLOB="6c6f63616c63616368696e672c6c6f63b3337a79746f3d646c6d2c6673636f6e746578743d726f6f742c736d61636b66736861743d2c657468302c736d61636b6673726f6f743d5c2c736d61636b66737472616e736d7574653d7d7b776c616e3076626f786e6574302c66756e633d46494c455f434845434b2c666f776e65723df7cfabb54c127c4a30dcd8e0ac0ddc1460f310a40566b1a83938653e377bd0553aa831a6ae15fb896ff89fddc840", @ANYRESDEC=r1, @ANYBLOB=',fsmagic=0x0000000000000007,\x00'])
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:00 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)

18:21:00 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)
getpriority(0x100080002, 0x0)

18:21:00 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  305.392178] encrypted_key: master key parameter 'user:' is invalid
18:21:00 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:00 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:00 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)

18:21:00 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  305.631856] encrypted_key: master key parameter 'user:' is invalid
18:21:00 executing program 2:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x100, &(0x7f0000001000/0x3000)=nil)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x0)

[  305.935388] encrypted_key: master key parameter 'user:' is invalid
18:21:00 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:00 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)

18:21:00 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:00 executing program 2:
openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:00 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:01 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

[  306.239312] encrypted_key: master key parameter 'user:' is invalid
18:21:01 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)

18:21:01 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'\nyz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:01 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  306.417853] encrypted_key: master key parameter 'user:' is invalid
18:21:01 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x8203)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={<r1=>0xffffffffffffffff}, 0x106, 0x5}}, 0x20)
ioctl$LOOP_CLR_FD(r0, 0x4c01)
r2 = request_key(&(0x7f0000000180)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='/dev/vcsa#\x00', 0xfffffffffffffffe)
r3 = request_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='/dev/vcsa#\x00', 0x0)
keyctl$unlink(0x9, r2, r3)
ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000140)={0x3, 0x10, 0x0, r0})
write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18)

18:21:01 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'#yz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:01 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  306.594983] encrypted_key: master key parameter 'user:' is invalid
18:21:01 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)

18:21:01 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'%yz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:01 executing program 2:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, &(0x7f0000000180)=""/126, 0x7e}, 0x3}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/229, 0xe5}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/72, 0x48}], 0x4, &(0x7f00000004c0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/69, 0x45}], 0x3, &(0x7f0000000840)=""/118, 0x76}, 0x8000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/211, 0xd3}], 0x1, &(0x7f0000000a80)=""/153, 0x99}, 0x1}], 0x4, 0x0, &(0x7f0000000c40))
getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000c80), &(0x7f0000000cc0)=0x8)
setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000d00)=0x1, 0x4)
munmap(&(0x7f0000000000/0x1000)=nil, 0x1000)
r2 = socket$kcm(0x29, 0x2, 0x0)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)
accept$packet(r1, &(0x7f0000000e00)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14)
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000e80)={'team0\x00', r3})

18:21:01 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  306.868314] encrypted_key: master key parameter 'user:' is invalid
18:21:01 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:02 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:02 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)

18:21:02 executing program 2:
mlockall(0x2)
openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x30001, 0x0)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:02 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'*yz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:02 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:02 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:02 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[], 0x0)

[  307.441798] encrypted_key: master key parameter 'user:' is invalid
18:21:02 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:02 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'+yz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:02 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:02 executing program 2:
mlockall(0x0)
shmat(0x0, &(0x7f0000003000/0x3000)=nil, 0x4000)

[  307.664282] encrypted_key: master key parameter 'user:' is invalid
18:21:02 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:03 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:03 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'-yz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:03 executing program 2:
mlockall(0x2)
r0 = shmget$private(0x0, 0x1000, 0x20, &(0x7f0000002000/0x1000)=nil)
shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x3000)

18:21:03 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)

18:21:03 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:03 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:03 executing program 2:
mlockall(0x0)
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x1, 0x0)
setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000100)=0x60, 0x2)
r1 = shmget(0x2, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil)
shmat(r1, &(0x7f0000002000/0x3000)=nil, 0x2000)

[  308.347129] encrypted_key: master key parameter 'user:' is invalid
18:21:03 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)

18:21:03 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'.yz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:03 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:03 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:03 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40080, 0x0)
ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000040))

[  308.618969] encrypted_key: master key parameter 'user:' is invalid
18:21:04 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:04 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)

18:21:04 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'0yz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:04 executing program 2:
r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={<r1=>0x0}, &(0x7f00000000c0)=0xc)
r2 = getpgid(r1)
ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000040)=r2)
mlockall(0x1)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
munlock(&(0x7f0000002000/0x4000)=nil, 0x4000)

18:21:04 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:04 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:04 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r0, &(0x7f0000000200)=0x42, 0x12)

[  309.293911] encrypted_key: master key parameter 'user:' is invalid
18:21:04 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'Xyz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:04 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  309.519140] encrypted_key: master key parameter 'user:' is invalid
18:21:04 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r0, &(0x7f0000000200)=0x42, 0x12)

18:21:04 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:04 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'cyz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:04 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:04 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:04 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'dyz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  309.775255] encrypted_key: master key parameter 'user:' is invalid
18:21:04 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000002000/0x1000)=nil, 0x3003)
r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x0)

18:21:04 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r0, &(0x7f0000000200)=0x42, 0x12)

18:21:04 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:04 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'iyz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  310.042357] encrypted_key: master key parameter 'user:' is invalid
18:21:04 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:04 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = shmget(0x3, 0x3000, 0x0, &(0x7f0000002000/0x3000)=nil)
shmat(r0, &(0x7f0000001000/0x1000)=nil, 0x2000)

18:21:04 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:04 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  310.158181] encrypted_key: master key parameter 'user:' is invalid
18:21:05 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:05 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'lyz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:05 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:05 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:05 executing program 2:
mlockall(0x2)
shmget$private(0x0, 0x4000, 0x400, &(0x7f0000000000/0x4000)=nil)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  310.410830] encrypted_key: master key parameter 'user:' is invalid
18:21:05 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:05 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:05 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'oyz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:05 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:05 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  310.682244] encrypted_key: master key parameter 'user:' is invalid
18:21:05 executing program 2:
r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0)
close(r0)
mlockall(0x4)
r1 = dup3(r0, r0, 0x80000)
r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00')
sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xf0, r2, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xa6}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bond\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth1_to_team\x00'}}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x216}]}, @TIPC_NLA_MEDIA={0x5c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2d1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}]}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x294}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x800}, @TIPC_NLA_NET_ADDR={0x8}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4000}, 0x10)
shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x4000)
utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x7530}})

18:21:05 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'pyz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:05 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:05 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  310.924273] encrypted_key: master key parameter 'user:' is invalid
18:21:05 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:05 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:05 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'uyz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:05 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:05 executing program 2:
r0 = socket$inet(0x2, 0x200000002, 0x0)
setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x84, @rand_addr, 0x15, 0x0, 'rr\x00'}, 0x2c)
setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x40, 0x0)
close(r0)
ioctl$KDDISABIO(r1, 0x4b37)
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x40, 0x0)
getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x0, 0x8, 0x7, 0x5, <r3=>0x0}, &(0x7f0000000200)=0x10)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000240)={r3, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x7ff, 0x7fffffff, 0x1ff, 0x4, 0x8}, 0x98)
mlockall(0x1)
shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x4000)
r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0)
ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, &(0x7f0000000040)=""/216)

18:21:05 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  311.212747] encrypted_key: master key parameter 'user:' is invalid
18:21:06 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:06 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:06 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:06 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'xyz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:06 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:06 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

[  311.500026] encrypted_key: master key parameter 'user:' is invalid
18:21:06 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'s\nz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:06 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:06 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:06 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

[  311.738419] encrypted_key: master key parameter 'user:' is invalid
18:21:06 executing program 2:
mlockall(0x2)
r0 = shmget(0x1, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)
pipe2(&(0x7f00000000c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
r3 = openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_user\x00', 0x0, 0x0)
connect$netlink(r2, &(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x8000000}, 0xc)
r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0)
timerfd_settime(r3, 0x1, &(0x7f0000000180)={{0x77359400}}, &(0x7f00000001c0))
shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x1000)
getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2)
openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x2000, 0x0)

18:21:06 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'s%z'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:06 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:06 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:06 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:06 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  312.122081] encrypted_key: master key parameter 'user:' is invalid
18:21:06 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:06 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:07 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  312.291571] encrypted_key: master key parameter 'user:' is invalid
18:21:07 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:07 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:07 executing program 5:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:07 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x15, 0x4, &(0x7f0000001200)=@framed={{}, [@alu={0x8000000201a7f19, 0x5, 0x7, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f0000000040)={{0x1, 0x0, 0xfffffffffffffffe, 0x8, 'syz1\x00', 0x9}, 0x0, [0x9, 0x6, 0x6, 0x1, 0x92, 0x9, 0x7b6, 0x4, 0x400, 0x66b, 0x100, 0x3b, 0x80000001, 0x800, 0x8000, 0x9, 0xd3b, 0x101, 0xffff, 0x6, 0x1f, 0x7, 0xfffffffffffffc01, 0x2, 0x8, 0x357, 0x100000000, 0x4, 0x3, 0x8, 0xffff, 0x7, 0x2, 0x3, 0x0, 0x0, 0x3, 0x20, 0x3, 0x80000000, 0x0, 0xfffffffffffffffb, 0x9, 0x5, 0x40, 0xa05, 0x9, 0x6, 0xfffffffffffffff8, 0x1ff, 0x8, 0x9, 0x8cb, 0x0, 0x3, 0x40, 0xfff, 0x80, 0x7fffffff, 0x4, 0x4, 0xfff, 0x7, 0x1000, 0x7, 0xfffffffffffffffb, 0x10000, 0xff, 0x5, 0x1, 0x3, 0x7, 0x7ff, 0x0, 0xfffffffffffff8a1, 0xf8, 0x0, 0x6, 0x7, 0x1, 0x0, 0x8, 0x1f, 0x7, 0xfff, 0x81, 0x83, 0x9, 0x10000, 0xfffffffffffff373, 0x0, 0x8, 0xf0, 0x10001, 0x71ea, 0x2, 0x400, 0xfff, 0x0, 0x7, 0x9, 0x100000000, 0x100, 0x5, 0x9, 0x101, 0xfffffffeffffffff, 0x1, 0xe0f9, 0x7, 0x4, 0x2, 0xfffffffffffff410, 0x401, 0x6, 0x9, 0x0, 0xffff, 0x800, 0x7fff, 0x2, 0x5, 0x1000, 0x5, 0x100000001, 0x8, 0xffff, 0x7], {0x0, 0x989680}})

18:21:07 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:07 executing program 5:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:07 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:07 executing program 5:
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

[  312.623065] encrypted_key: master key parameter 'user:' is invalid
18:21:07 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:07 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:07 executing program 5:
perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:07 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
gettid()
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

[  312.849700] encrypted_key: master key parameter 'user:' is invalid
[  312.868000] encrypted_key: master key parameter 'user:' is invalid
18:21:07 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:07 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:07 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x5}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:07 executing program 2:
r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2)
ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000040)={0x8, 0x4, 0x8})
mlockall(0x2)
syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:07 executing program 5:
perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:07 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x6}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  313.081432] encrypted_key: master key parameter 'user:' is invalid
18:21:08 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  313.211924] encrypted_key: master key parameter 'user:' is invalid
18:21:08 executing program 5:
perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:08 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:08 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x102, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:08 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x7}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:08 executing program 2:
mlockall(0x2)
r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0)
write$vhci(r0, &(0x7f0000000040)=@HCI_ACLDATA_PKT={0x2, "a8e6abd5677df84a0b00afd228161ec7596482f94583801ab1f4610191ccef943f5616a8ca9e9bb7ff92de858af5fa305802cd243bb11d0d033264c9f78279142941eebd7efc80d467"}, 0x4a)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:08 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:08 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:08 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  313.542236] encrypted_key: master key parameter 'user:' is invalid
18:21:08 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:08 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:08 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x60}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:08 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:08 executing program 2:
r0 = getpgid(0x0)
r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00')
sendmsg$TIPC_NL_PEER_REMOVE(r1, 0x0, 0x8040)
mlockall(0x2)
r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x4000)
ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000080)=""/24)
ioctl$TUNSETLINK(r2, 0x400454cd, 0x327)
ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f00000001c0)={r2, r2, 0x3, 0xcb, &(0x7f00000000c0)="225e875d3ee0d9eea3bb28830df22c8ba19fc826cf908928df80fddb40f3cec30f900690cfc1686d450c1c5be0cdf3e4746007d5ad843c0afdd9b3e9108e6ca989e80e923b5cc4fbb5b1f8f1d7cfa28195b275ca93ca08e50a9a5ed8c4faf9d1f4166fa6e08d1746f603e6b7eeb2b825c361e43bb05d4db98acc782c03490fb233a9560acf958bba1f50390c83c1aa517a719fb176a1618dc437aa65077f5421293fdd5de268ec59f96614832ce32d83f26e3774f5014c5af1e1b5f599032fa76b9aed26529f4e9ad49be3", 0x4, 0x8001, 0x0, 0x7, 0x1, 0x2, 0x1, 'syz0\x00'})
r3 = shmget(0x2, 0xe000, 0x54000000, &(0x7f0000000000/0xe000)=nil)
shmat(r3, &(0x7f0000003000/0x4000)=nil, 0x3ffd)

18:21:08 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
open(&(0x7f00000000c0)='./file0\x00', 0xde484dffe17c3b9d, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:08 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x300}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  313.770157] encrypted_key: master key parameter 'user:' is invalid
18:21:08 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  313.949277] encrypted_key: master key parameter 'user:' is invalid
18:21:08 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:08 executing program 2:
mlockall(0x2)
r0 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x80800)
setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f00000000c0)=0x80, 0x4)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:08 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x500}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:08 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:08 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:08 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x600}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  314.140797] encrypted_key: master key parameter 'user:' is invalid
18:21:08 executing program 2:
r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x200042)
bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000040)="f85c1bc6f95a6de1a95015a3c0b1daf820769427df23d5f2bb7794601bafca5f9d339b564b400b43e5f08873c21b5e80de01f9b268f7ec77020309c1cfb3cf4ff946b43e70b4c476459f0feba263e9eed5c3835389d604679ae1cfa42eb100e9c7730ab2b9ea20c156720baadb1677639558948fbef7870825ce2fc8c0dd86547e3520b3f9eabb784aceadd4", &(0x7f0000000100)="94f378b17a3c6e5f22a552a94ff1a88f53f284c0206d486cb490df9aeaa732e45e407d8c12d7413296eb7847e852e532a4ef706172e126e72971a74b8e7167236cf84fc91b8b19defe93d391f54f4a80a1deae33acffffcc23fd8a96967390556f4e0bfe16a4df41f8cec1164573163af266169d7db870a13b5b393a9d703700c81f8ce4e6e958e1cb208a2a0446"}, 0x20)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:09 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:09 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:09 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

[  314.346841] encrypted_key: master key parameter 'user:' is invalid
18:21:09 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:09 executing program 2:
mlockall(0x4)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:09 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x700}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:09 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:09 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  314.639594] encrypted_key: master key parameter 'user:' is invalid
18:21:09 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:09 executing program 2:
mlockall(0x2)
r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000040)={{0x37, @rand_addr=0xd570, 0x4e21, 0x4, 'sed\x00', 0x3d, 0xbe, 0x7}, {@rand_addr=0x401, 0x4e20, 0x3, 0x9, 0x2, 0x6}}, 0x44)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:09 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:09 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:09 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

[  314.774635] encrypted_key: master key parameter 'user:' is invalid
18:21:09 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:09 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x5, 0x100)
sendmsg$nl_crypto(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=@getstat={0xe0, 0x15, 0x0, 0x80000001, 0x25dfdbfd, {{'chacha20-simd\x00'}, [], [], 0x0, 0x400}, ["", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x4000}, 0x4)

[  314.962501] encrypted_key: master key parameter 'user:' is invalid
18:21:09 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:09 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:09 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x6000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:09 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:09 executing program 2:
mlockall(0x80002)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x501000, 0x0)
ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x3, 0x2, 0x81, 0x0, 0x3})
epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000080)={0x16})

[  315.121015] encrypted_key: master key parameter 'user:' is invalid
18:21:10 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x6b6b6b}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:10 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:10 executing program 2:
mlockall(0x2)
r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x410900)
r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2)
getsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4)
setsockopt$inet6_dccp_int(r0, 0x21, 0x10, &(0x7f0000000180)=0x7fff, 0x4)
ioctl$NBD_SET_SOCK(r0, 0xab00, r1)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0)

18:21:10 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:10 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfeffff}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  315.307489] encrypted_key: master key parameter 'user:' is invalid
18:21:10 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:10 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

[  315.449781] encrypted_key: master key parameter 'user:' is invalid
18:21:10 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:10 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x1000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:10 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9)

18:21:10 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:10 executing program 3:
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

[  315.648434] encrypted_key: master key parameter 'user:' is invalid
18:21:10 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:10 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:10 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r0, &(0x7f0000000200)=0x42, 0x12)

18:21:10 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000001000/0x2000)=nil, 0x4000)

18:21:10 executing program 3:
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:10 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r0, &(0x7f0000000200)=0x42, 0x12)

18:21:10 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  315.878964] encrypted_key: master key parameter 'user:' is invalid
18:21:10 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  316.025688] encrypted_key: master key parameter 'user:' is invalid
18:21:10 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:10 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x4000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:10 executing program 2:
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x371100, 0x0)
getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:11 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r0, &(0x7f0000000200)=0x42, 0x12)

18:21:11 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x5000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:11 executing program 3:
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

[  316.212244] encrypted_key: master key parameter 'user:' is invalid
[  316.306156] encrypted_key: master key parameter 'user:' is invalid
18:21:11 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:11 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:11 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x6000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:11 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:11 executing program 2:
mlockall(0x1)
r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x490001)
ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000040)={{0x4, 0x2}, 'port1\x00', 0x4, 0x11010, 0x4, 0x5, 0xff, 0x8000, 0x8c2, 0x0, 0x4, 0x7})
r1 = shmget(0x3, 0x2000, 0x88, &(0x7f0000100000/0x2000)=nil)
shmat(r1, &(0x7f0000000000/0x200000)=nil, 0x4000)

18:21:11 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:11 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:11 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x7000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  316.545360] encrypted_key: master key parameter 'user:' is invalid
18:21:11 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  316.757704] encrypted_key: master key parameter 'user:' is invalid
18:21:11 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x20000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:11 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:11 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200)=0x42, 0x12)

18:21:11 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

[  316.935410] encrypted_key: master key parameter 'user:' is invalid
18:21:11 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:11 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)

[  317.130772] encrypted_key: master key parameter 'user:' is invalid
18:21:11 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:12 executing program 2:
mlockall(0x4)
r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0xda32, 0x165800)
fsync(r0)
shmget(0x1, 0x1000, 0x2, &(0x7f0000ffd000/0x1000)=nil)
shmget(0x3, 0x3000, 0x60, &(0x7f0000ffc000/0x3000)=nil)
r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0)
ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f00000000c0)={0x60})
ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000080))
setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'hwsim0\x00', 0x2}, 0x18)
r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x80000, 0x0)
ioctl$BLKFLSBUF(r2, 0x1261, &(0x7f0000000180)=0x5)
r3 = shmget$private(0x0, 0x2000, 0x14, &(0x7f0000ffc000/0x2000)=nil)
shmat(r3, &(0x7f0000001000/0x3000)=nil, 0x4000)

18:21:12 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:12 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x60000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:12 executing program 3:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:12 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)

[  317.393055] encrypted_key: master key parameter 'user:' is invalid
18:21:12 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x6b6b6b00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:12 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:12 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:12 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:12 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000002000/0x3000)=nil, 0x4000)

[  317.577053] encrypted_key: master key parameter 'user:' is invalid
18:21:12 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)

18:21:12 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfffffe00}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:12 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, 0x0, 0x0)

18:21:12 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0)
ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000040))
ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000980)={0x8, &(0x7f0000000880)=[{}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @local}, {}, {}, {0x0, 0x0, 0x0, @local}, {}]})

18:21:12 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:12 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:12 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  317.898008] encrypted_key: master key parameter 'user:' is invalid
18:21:12 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, 0x0, 0x0)

18:21:12 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xffffff7f}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:12 executing program 2:
mlockall(0x2)
r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x10000, 0xc402)
r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000)
ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000040)=r1)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:12 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:13 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  318.201923] encrypted_key: master key parameter 'user:' is invalid
18:21:13 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:13 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, 0x0, 0x0)

18:21:13 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x1000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:13 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:13 executing program 2:
mlockall(0x1000040000002)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x1)
utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x5, 0x90})

18:21:13 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x6b6b6b00000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:13 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200), 0x12)

[  318.445937] encrypted_key: master key parameter 'user:' is invalid
18:21:13 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x801)
ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0x0, @pix={0x9, 0x5, 0x77775d4e, 0xb, 0x7, 0x1ff, 0x2, 0x401, 0x1, 0x4, 0x1, 0x3}})

18:21:13 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  318.611920] encrypted_key: master key parameter 'user:' is invalid
18:21:13 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:13 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xfeffff00000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:13 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001bc0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x4c}]}, &(0x7f0000f6bffb)='GPL\x00', 0xffffffffffffffff, 0x14e, &(0x7f00001a7f05)=""/251}, 0x48)

18:21:13 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:13 executing program 2:
mlockall(0x2)
r0 = shmget$private(0x0, 0x4000, 0x1400, &(0x7f0000ffa000/0x4000)=nil)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x4800, 0x0)
socket$tipc(0x1e, 0x2000002, 0x0)
write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000040)={0xa, 0x4, 0x5, 0x40}, 0xa)
shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0xbffe)

18:21:13 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x100000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  318.822533] encrypted_key: master key parameter 'user:' is invalid
18:21:13 executing program 5:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
r1 = msgget$private(0x0, 0x0)
msgctl$IPC_RMID(r1, 0x0)

18:21:13 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:13 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x101100, 0x0)
r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x400, 0x0)
ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000040))

[  319.040795] encrypted_key: master key parameter 'user:' is invalid
18:21:13 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:13 executing program 5:
r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/uts\x00')
ioctl$FS_IOC_GETFLAGS(r0, 0xb701, 0x0)

18:21:13 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x200000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:13 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:14 executing program 2:
mlockall(0x2)
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x800, 0x0)
ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000180)={0x5, 0x3, 0x100, 0x2, 0xd, 0x1ff, 0x0, 0x2, 0x7fffffff, 0xffff, 0x9, 0x9})
r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c)
getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000200)=0x1e)
getsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000)=0x1, &(0x7f00000001c0)=0xffffffffffffffa2)
ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000240)={0x3, <r2=>0x0, 0x0, 0x73})
ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000280)={0x8, r2})
ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000080)=""/177)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:14 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  319.338409] encrypted_key: master key parameter 'user:' is invalid
18:21:14 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:14 executing program 5:
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0)
r1 = socket$kcm(0x29, 0x5, 0x0)
ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x81)
ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0)
ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&')
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\"\x00\b\x00%'], 0x5)
ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000900))
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={r2, 0x0, 0x1, 0x0, 0x0}, 0x20)
perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0)

18:21:14 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x300000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:14 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:14 executing program 2:
r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0xa2)
utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0xfe)
tee(r0, r0, 0xab, 0x3)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
socket$inet_icmp_raw(0x2, 0x3, 0x1)

18:21:14 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  319.661905] encrypted_key: master key parameter 'user:' is invalid
[  319.708756] device nr0 entered promiscuous mode
18:21:14 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x400000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:14 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:14 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:14 executing program 2:
mlockall(0x2)
r0 = semget$private(0x0, 0x4, 0xc0)
semop(r0, &(0x7f0000000000)=[{0x3, 0x2, 0x804}, {0x0, 0x3ff, 0x1800}, {0x3, 0x4, 0x1000}, {0x2, 0x2f0, 0x800}, {0x1, 0x8}, {0x3, 0x7fff}], 0x6)
r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0)
r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x211, r2, 0x304, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8001}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x81}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2e}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6b}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0xbc}, 0x1, 0x0, 0x0, 0x20044000}, 0x40)
ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000080)={0x401, 0x7, 0x9})
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  319.932469] encrypted_key: master key parameter 'user:' is invalid
18:21:14 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x500000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:14 executing program 2:
mlockall(0x1000007)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:14 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x40)
ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x9)

[  320.146924] encrypted_key: master key parameter 'user:' is invalid
18:21:15 executing program 5:
syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0)
openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0)
r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000140)=0x1540000)
add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb)
sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0)
dup(0xffffffffffffffff)
ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0)
add_key(0x0, &(0x7f0000001a40)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8)
getegid()
ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[])
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unshare(0x20600)
prctl$PR_CAPBSET_READ(0x17, 0x18)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)

18:21:15 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x600000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:15 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="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", 0x1000, 0xfffffffffffffffa)
keyctl$get_keyring_id(0x0, r0, 0x10000)

18:21:15 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:15 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:15 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080))
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

[  320.468982] encrypted_key: master key parameter 'user:' is invalid
18:21:15 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x700000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:15 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c12")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:15 executing program 2:
mlockall(0x0)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:15 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:15 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  320.693127] encrypted_key: master key parameter 'user:' is invalid
18:21:15 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x2000000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  320.912591] encrypted_key: master key parameter 'user:' is invalid
18:21:15 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc67a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2b, 0x0, 0x0)
bind$inet(r0, 0x0, 0x0)
setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000900)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00')
r2 = creat(&(0x7f00000005c0)='./bus\x00', 0x0)
fcntl$setstatus(r2, 0x4, 0x86100)
ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000080))
ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000240)={0x0, @bt={0x80000000, 0x87cc, 0x0, 0x3, 0x9, 0x100, 0x8, 0x4, 0x6, 0x2, 0x1, 0xfffffffffffffffe, 0x9, 0x6, 0x8, 0x20}})
sendfile(r2, r1, &(0x7f0000000180), 0x100000005)

18:21:15 executing program 2:
prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000))
mlockall(0x4)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x4, 0x100)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x620, 0x2, 0x3ff, 'queue0\x00', 0x2})

18:21:15 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x3f00000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:15 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c12")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:15 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  321.082982] encrypted_key: master key parameter 'user:' is invalid
18:21:15 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:15 executing program 2:
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000140)='batadv0\x00')
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000040)={<r2=>0x0, 0x9}, &(0x7f0000000080)=0x8)
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x9216, 0x3ff, 0x8000, 0xc6f, 0x4, 0xfff, 0x8001, 0x9, r2}, &(0x7f0000000100)=0x20)

18:21:16 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0x6000000000000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:16 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c12")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:16 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0xffffffffffffffff, 0xffffff7f00000000}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  321.335901] encrypted_key: master key parameter 'user:' is invalid
18:21:16 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:16 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  321.504888] encrypted_key: master key parameter 'user:' is invalid
18:21:16 executing program 5:
r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0xa2)
utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0xfe)
tee(r0, r0, 0xab, 0x3)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
socket$inet_icmp_raw(0x2, 0x3, 0x1)

18:21:16 executing program 2:
r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x400, 0x101000)
sendfile(r0, r0, &(0x7f00000000c0)=0x4000000000000, 0x4)
mlockall(0x2)
ioctl(r0, 0xf797, &(0x7f0000000100)="3fb13c4410b68cb001c7c5d1e951d4d82b3dce5133abbb3f57474fd9f6e1e6f5774f3757800095160100fa83dd55e7cd8365caa798ac69f61ee4be1e40993115ccbc176271e5952656cf3ea2f1bc3898157a2c7bc86a24555926ee0b334dde6e049cf8bb8bcb0e402abc6430f20fdb9aca1af796043ec093a9cb4e92201a969a6d050b8e928d7bd5")
r1 = shmget(0x3, 0x1000, 0x110, &(0x7f0000ffe000/0x1000)=nil)
shmat(r1, &(0x7f0000002000/0x4000)=nil, 0x1ffc)
fchmod(r0, 0x83)

18:21:16 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xfffff, 0xfffffffffffffffe)

18:21:16 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:16 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:16 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:16 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2)
r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x118, r1, 0x821, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x38}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x507}]}, @IPVS_CMD_ATTR_SERVICE={0x68, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x1b}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x118}, 0x1, 0x0, 0x0, 0x10}, 0x20000000)
ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f0000000040)=0x1)
ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f00000002c0))

18:21:16 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x200001ca, 0xfffffffffffffffe)

18:21:16 executing program 5:
r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0xa2)
utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0xfe)
tee(r0, r0, 0xab, 0x3)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
socket$inet_icmp_raw(0x2, 0x3, 0x1)

18:21:16 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:17 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:17 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:17 executing program 1:
add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = add_key(&(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="6ef407683bc6e13f32d18649c0d0d1d17ca2aae51b51d75daa769478343ae717c7abad89170b8bb77e0c70e0df6e980f10483a5679713ea9687ab4d5fea607f4ad174782f6032284293e47573dbae316dd312fe23935a5b40fbeec6d1ac89fff211014ea3c669b1d57484b38d3d38e35fa8c818b18ff4fe2fb5fad5d9a", 0x7d, 0xfffffffffffffffc)
keyctl$instantiate(0xc, r0, &(0x7f0000000380)=ANY=[@ANYRESOCT], 0x1, 0x0)
r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40, 0x0)
ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f00000000c0)={0xfffffffffffffe00, 0x0, 0x401, 0x702})
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r1, 0x28, &(0x7f0000000100)}, 0x10)

18:21:17 executing program 5:
r0 = open(&(0x7f0000000000)='./file0\x00', 0x8040, 0xa2)
utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0xfe)
tee(r0, r0, 0xab, 0x3)
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
socket$inet_icmp_raw(0x2, 0x3, 0x1)

18:21:17 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:17 executing program 2:
r0 = shmget$private(0x0, 0x1000, 0x1008, &(0x7f0000003000/0x1000)=nil)
shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/105)
mlockall(0x2)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x42000, 0x0)
r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x100000001, 0x400)
ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:17 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e657710656372797174667420751638720b41d5679bb472982f1eb35abe2c80add8241374bc06d8ffda9e72bd9e9369edfb7ad873d06d932bd5860c99749b1343a14b656c21a22666c07883a5796ea028ee4ec7f72b0c24dee962ed5ba76a5cea6edde4b0c3531e787160e0cea9dcea4a55a060a46180b8302628314d44bcd90a52b615338fa02196cbefe280030d49b222e5d95805ae7d791d28180eec1468acbe7c22ee6d84473c0b7d55492e428f45f55f7fcac5fe4964495976e951b8e45f85123cbbd6b719"], 0x1, 0x0)
r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x440040, 0x0)
ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000001c0))
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
chroot(&(0x7f0000000000)='./file0\x00')
r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0)
setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000080)={{0x2, @multicast1, 0x4e20, 0x1, 'wlc\x00', 0x20, 0x400, 0x6a}, {@remote, 0x4e24, 0x2000, 0xf14, 0x7fffffff, 0x100000001}}, 0x44)

[  322.398512] encrypted_key: insufficient parameters specified
[  322.435396] encrypted_key: insufficient parameters specified
18:21:17 executing program 5:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r1 = openat$cgroup_int(r0, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r1, &(0x7f0000000200), 0x12)

18:21:17 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:17 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  322.706687] encrypted_key: insufficient parameters specified
18:21:17 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6577106565703a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  322.754400] encrypted_key: insufficient parameters specified
18:21:17 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x0, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:17 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a0")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:17 executing program 0:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:17 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0)
ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000000c0)={0x3f, 0x10000, 0x4, 0x3, 0x19, 0x8})
ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000100)={<r1=>0x0})
ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000001c0)={r1, &(0x7f0000000140)=""/92})
r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400, 0x0)
inotify_init()
ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000040)=0x5c28)

18:21:17 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  322.930764] encrypted_key: insufficient parameters specified
18:21:17 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e6577106563723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:17 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a0")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:17 executing program 5:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'+yz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:17 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xe0000, 0x0)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={<r1=>0x0, 0x4}, &(0x7f00000000c0)=0x8)
setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000100)=r1, 0x4)
ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000040))

[  323.167223] encrypted_key: insufficient parameters specified
[  323.199756] encrypted_key: master key parameter 'user:' is invalid
18:21:18 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:18 executing program 4:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:18 executing program 1:
prctl$PR_MCE_KILL(0x21, 0x1, 0x1)
add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0xfffffffffffffff9)
r0 = add_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3987f1914c479f2c932483c17f635377c4300cbc035beba2c19fa617abcc9f7ac5616c266072717f2a0533d983eab67e12f8750a61ccce9becae59131e0351954817eb55feef05badd20e99bcb9498e5a0761ec71dab449298d72c452a63ea602ca57a6ffa90a2fa0c5600630d970d9f47a3fff08651", 0x76, 0xfffffffffffffffe)
r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2)
ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000300)={0x754, 'syz0\x00'})
r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0)
getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000100)=0x4)
keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="65723a00000000000400746289ca0d16c5b37ee6000000009ce1ab0000000000000000"], 0x1, r0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
clock_gettime(0x0, &(0x7f0000000340)={<r3=>0x0, <r4=>0x0})
ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000380)={0x0, 0xe, 0x4, 0x21004000, {r3, r4/1000+10000}, {0x0, 0xf, 0x401, 0x8, 0x101, 0x6, "11dfb05f"}, 0x6, 0x2, @fd=r1, 0x4})

18:21:18 executing program 5:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, &(0x7f0000000180)=""/126, 0x7e}, 0x3}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/229, 0xe5}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/72, 0x48}], 0x4, &(0x7f00000004c0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/69, 0x45}], 0x3, &(0x7f0000000840)=""/118, 0x76}, 0x8000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/211, 0xd3}], 0x1, &(0x7f0000000a80)=""/153, 0x99}, 0x1}], 0x4, 0x0, &(0x7f0000000c40))
getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000c80), &(0x7f0000000cc0)=0x8)
setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000d00)=0x1, 0x4)
munmap(&(0x7f0000000000/0x1000)=nil, 0x1000)
r2 = socket$kcm(0x29, 0x2, 0x0)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)
accept$packet(r1, &(0x7f0000000e00)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14)
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000e80)={'team0\x00', r3})

18:21:18 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:18 executing program 2:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000001000/0x3000)=nil)
r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6117, 0x40000)
recvmmsg(r1, &(0x7f0000004140)=[{{&(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/226, 0xe2}, {&(0x7f0000000300)=""/137, 0x89}, {&(0x7f00000003c0)=""/84, 0x54}], 0x3, &(0x7f0000000440)=""/134, 0x86}, 0x80}, {{&(0x7f0000000500)=@sco, 0x80, &(0x7f0000000680)=[{&(0x7f0000000580)=""/81, 0x51}, {&(0x7f0000000600)=""/59, 0x3b}, {&(0x7f0000000640)=""/33, 0x21}], 0x3, &(0x7f00000006c0)=""/241, 0xf1}, 0x1}, {{&(0x7f00000007c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000840)=""/89, 0x59}, {&(0x7f00000008c0)=""/33, 0x21}, {&(0x7f0000000900)=""/33, 0x21}, {&(0x7f0000000940)=""/142, 0x8e}, {&(0x7f0000000a00)=""/110, 0x6e}, {&(0x7f0000000a80)=""/56, 0x38}], 0x6, &(0x7f0000000b40)=""/4096, 0x1000}, 0xffff}, {{&(0x7f0000001b40)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001bc0)=""/57, 0x39}, {&(0x7f0000001c00)=""/96, 0x60}, {&(0x7f0000001c80)=""/191, 0xbf}, {&(0x7f0000001d40)=""/147, 0x93}], 0x4, &(0x7f0000001e40)=""/170, 0xaa}, 0x4}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001f00)=""/131, 0x83}], 0x1}, 0x7ff}, {{&(0x7f0000002000)=@hci={0x1f, <r2=>0x0}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002080)=""/184, 0xb8}, {&(0x7f0000002140)=""/73, 0x49}, {&(0x7f00000021c0)=""/150, 0x96}, {&(0x7f0000002280)=""/203, 0xcb}, {&(0x7f0000002380)=""/30, 0x1e}], 0x5}, 0x6}, {{&(0x7f0000002440)=@generic, 0x80, &(0x7f0000002500)=[{&(0x7f00000024c0)=""/22, 0x16}], 0x1, &(0x7f0000002540)=""/241, 0xf1}}, {{&(0x7f0000002640)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000003800)=[{&(0x7f00000026c0)=""/160, 0xa0}, {&(0x7f0000002780)=""/76, 0x4c}, {&(0x7f0000002800)=""/4096, 0x1000}], 0x3}, 0x8}, {{0x0, 0x0, &(0x7f0000003e80)=[{&(0x7f0000003840)=""/229, 0xe5}, {&(0x7f0000003940)=""/198, 0xc6}, {&(0x7f0000003a40)=""/81, 0x51}, {&(0x7f0000003ac0)=""/109, 0x6d}, {&(0x7f0000003b40)=""/157, 0x9d}, {&(0x7f0000003c00)=""/57, 0x39}, {&(0x7f0000003c40)=""/46, 0x2e}, {&(0x7f0000003c80)=""/252, 0xfc}, {&(0x7f0000003d80)=""/95, 0x5f}, {&(0x7f0000003e00)=""/123, 0x7b}], 0xa, &(0x7f0000003f40)=""/14, 0xe}, 0x6a}, {{&(0x7f0000003f80)=@nl, 0x80, &(0x7f0000004100)=[{&(0x7f0000004000)=""/253, 0xfd}], 0x1}, 0x5c00000000}], 0xa, 0x20, &(0x7f00000043c0)={0x77359400})
ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000004400)={@empty, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x1ff, 0x2, 0x400, 0x100, 0x20000, r2})
ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f00000000c0)={0x8, 0x2, 0x4, 0x4000000, {}, {0x5, 0x2, 0x3b0540c, 0x7, 0xff, 0x7, "8ff268fe"}, 0x5, 0x2, @userptr=0x250, 0x4})
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x1000)
pipe2(&(0x7f00000001c0)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff}, 0x8803)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
ioctl$FIBMAP(r3, 0x1, &(0x7f0000000080)=0x808)

18:21:18 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a0")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:18 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
rt_sigpending(&(0x7f0000000000), 0x8)
mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x20, &(0x7f00000001c0)='syz')
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  323.382498] encrypted_key: insufficient parameters specified
[  323.410621] encrypted_key: insufficient parameters specified
[  323.564735] encrypted_key: master key parameter 'user:' is invalid
18:21:18 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:18 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000040)={0x77359400}, 0x10)

18:21:18 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000)
ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000000)={0x2, 0x3, {0x56, 0xfffffffffffffffa, 0x7fff, {0x6}, {0x1, 0xf9c}, @cond=[{0x7, 0x2, 0xfffffffffffffffb, 0x51, 0x1, 0x4}, {0xfffffffffffffffc, 0x5, 0x7, 0x3, 0x20, 0x80000000}]}, {0x57, 0x3e4d0cd0, 0x62, {0x7ff, 0x7fff}, {0xd6, 0x7ff}, @cond=[{0xffffffff7fffffff, 0x100, 0x1f, 0x1ff, 0x2a, 0x4}, {0xffffffff, 0x0, 0x10000, 0x100000001, 0x0, 0x80000001}]}})
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
socket(0xf, 0x0, 0x1f)

18:21:18 executing program 5:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, &(0x7f0000000180)=""/126, 0x7e}, 0x3}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/229, 0xe5}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/72, 0x48}], 0x4, &(0x7f00000004c0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/69, 0x45}], 0x3, &(0x7f0000000840)=""/118, 0x76}, 0x8000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/211, 0xd3}], 0x1, &(0x7f0000000a80)=""/153, 0x99}, 0x1}], 0x4, 0x0, &(0x7f0000000c40))
getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000c80), &(0x7f0000000cc0)=0x8)
setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000d00)=0x1, 0x4)
munmap(&(0x7f0000000000/0x1000)=nil, 0x1000)
r2 = socket$kcm(0x29, 0x2, 0x0)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)
accept$packet(r1, &(0x7f0000000e00)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14)
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000e80)={'team0\x00', r3})

18:21:18 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:18 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:18 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  323.816525] encrypted_key: master key parameter 'user:' is invalid
18:21:18 executing program 5:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, &(0x7f0000000180)=""/126, 0x7e}, 0x3}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/229, 0xe5}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/72, 0x48}], 0x4, &(0x7f00000004c0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/69, 0x45}], 0x3, &(0x7f0000000840)=""/118, 0x76}, 0x8000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/211, 0xd3}], 0x1, &(0x7f0000000a80)=""/153, 0x99}, 0x1}], 0x4, 0x0, &(0x7f0000000c40))
getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000c80), &(0x7f0000000cc0)=0x8)
setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000d00)=0x1, 0x4)
munmap(&(0x7f0000000000/0x1000)=nil, 0x1000)
r2 = socket$kcm(0x29, 0x2, 0x0)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)
accept$packet(r1, &(0x7f0000000e00)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14)
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000e80)={'team0\x00', r3})

18:21:18 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:18 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x66500, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4)
r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9)
ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080))

18:21:18 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1b, 0xfffffffffffffffe)

18:21:18 executing program 5:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, &(0x7f0000000180)=""/126, 0x7e}, 0x3}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/229, 0xe5}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/72, 0x48}], 0x4, &(0x7f00000004c0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/69, 0x45}], 0x3, &(0x7f0000000840)=""/118, 0x76}, 0x8000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/211, 0xd3}], 0x1, &(0x7f0000000a80)=""/153, 0x99}, 0x1}], 0x4, 0x0, &(0x7f0000000c40))
getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000c80), &(0x7f0000000cc0)=0x8)
setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000d00)=0x1, 0x4)
munmap(&(0x7f0000000000/0x1000)=nil, 0x1000)
socket$kcm(0x29, 0x2, 0x0)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)
accept$packet(r1, &(0x7f0000000e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000e40)=0x14)

18:21:18 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:18 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x2, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:19 executing program 0:
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  324.175217] encrypted_key: master key parameter 'user:' is invalid
18:21:19 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f00000001c0)=ANY=[], 0x0, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x400, 0x0)
bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10)
setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e22, 0x66e, @mcast1}}, 0x0, 0x0, 0x0, "845459e4f39cc355d514ba2c3cc8d36caedef5839e7f6d614253fa42a1539dbe20c2a32832e248b40a3d7d626ebbe17f8e0c61e21be66281c28027ebe502b5bb1750587440797fcdbbe7f367278c675e"}, 0xd8)

18:21:19 executing program 5:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, &(0x7f0000000180)=""/126, 0x7e}, 0x3}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/229, 0xe5}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/72, 0x48}], 0x4, &(0x7f00000004c0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/69, 0x45}], 0x3, &(0x7f0000000840)=""/118, 0x76}, 0x8000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/211, 0xd3}], 0x1, &(0x7f0000000a80)=""/153, 0x99}, 0x1}], 0x4, 0x0, &(0x7f0000000c40))
getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000c80), &(0x7f0000000cc0)=0x8)
setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000d00)=0x1, 0x4)
munmap(&(0x7f0000000000/0x1000)=nil, 0x1000)
socket$kcm(0x29, 0x2, 0x0)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:19 executing program 2:
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x1000)

18:21:19 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:19 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:19 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  324.450156] encrypted_key: insufficient parameters specified
18:21:19 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000002000/0x2000)=nil, 0x4000)

[  324.492314] encrypted_key: insufficient parameters specified
18:21:19 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65771065637279707466732075736506580e4aebd99e67face6ad6a35fbb723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:19 executing program 5:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, &(0x7f0000000180)=""/126, 0x7e}, 0x3}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/229, 0xe5}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/72, 0x48}], 0x4, &(0x7f00000004c0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/69, 0x45}], 0x3, &(0x7f0000000840)=""/118, 0x76}, 0x8000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/211, 0xd3}], 0x1, &(0x7f0000000a80)=""/153, 0x99}, 0x1}], 0x4, 0x0, &(0x7f0000000c40))
getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000c80), &(0x7f0000000cc0)=0x8)
setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000d00)=0x1, 0x4)
munmap(&(0x7f0000000000/0x1000)=nil, 0x1000)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:19 executing program 2:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc)
getpriority(0x100080002, 0x0)

18:21:19 executing program 4:
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:19 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

[  324.667641] encrypted_key: insufficient parameters specified
18:21:19 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:19 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
r0 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb)
r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd)
keyctl$unlink(0x9, r0, r1)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:19 executing program 5:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, &(0x7f0000000180)=""/126, 0x7e}, 0x3}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/229, 0xe5}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/72, 0x48}], 0x4, &(0x7f00000004c0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/69, 0x45}], 0x3, &(0x7f0000000840)=""/118, 0x76}, 0x8000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/211, 0xd3}], 0x1, &(0x7f0000000a80)=""/153, 0x99}, 0x1}], 0x4, 0x0, &(0x7f0000000c40))
getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000c80), &(0x7f0000000cc0)=0x8)
setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000d00)=0x1, 0x4)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:19 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

[  324.904957] encrypted_key: master key parameter 'user:' is invalid
18:21:19 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:19 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:19 executing program 5:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, &(0x7f0000000180)=""/126, 0x7e}, 0x3}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/229, 0xe5}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/72, 0x48}], 0x4, &(0x7f00000004c0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/69, 0x45}], 0x3, &(0x7f0000000840)=""/118, 0x76}, 0x8000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/211, 0xd3}], 0x1, &(0x7f0000000a80)=""/153, 0x99}, 0x1}], 0x4, 0x0, &(0x7f0000000c40))
getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000c80), &(0x7f0000000cc0)=0x8)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:19 executing program 1:
request_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='{::\x00', 0xfffffffffffffffb)
r0 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff)
r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa)
keyctl$instantiate(0xc, r1, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, r0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
r2 = accept(0xffffffffffffffff, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x80)
ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f00000000c0)={{0x1000, 0x20, 0x8, 0xfffffffffffffffc, 0xff, 0x1}, 0x3})

[  324.946905] encrypted_key: master key parameter 'user:' is invalid
18:21:19 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  325.081110] encrypted_key: master key parameter 'user:' is invalid
18:21:19 executing program 2:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:19 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:19 executing program 5:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
recvmmsg(0xffffffffffffff9c, &(0x7f0000000b40)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, &(0x7f0000000180)=""/126, 0x7e}, 0x3}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/229, 0xe5}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/139, 0x8b}, {&(0x7f0000000400)=""/72, 0x48}], 0x4, &(0x7f00000004c0)=""/188, 0xbc}, 0x4}, {{&(0x7f0000000580)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/247, 0xf7}, {&(0x7f0000000700)=""/79, 0x4f}, {&(0x7f0000000780)=""/69, 0x45}], 0x3, &(0x7f0000000840)=""/118, 0x76}, 0x8000}, {{&(0x7f00000008c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/211, 0xd3}], 0x1, &(0x7f0000000a80)=""/153, 0x99}, 0x1}], 0x4, 0x0, &(0x7f0000000c40))
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:19 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000000000000723a0000800000000000"], 0x1, 0x0)
r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000080), 0x0, r0)

[  325.141241] encrypted_key: master key parameter 'user:' is invalid
18:21:20 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:20 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e65771072e090bbfa42814c3b55f0c3e20c6500000000"], 0x1, 0x0)
r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0xa82, 0x0)
ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000000c0)={0x1, 0x2, 0x74, 0x6})
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
readahead(r0, 0xa8, 0x2)
syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x100000000, 0x40)

18:21:20 executing program 5:
mlockall(0x2)
r0 = shmget$private(0x0, 0x3000, 0x8, &(0x7f0000001000/0x3000)=nil)
shmat(r0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:20 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:20 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  325.475075] encrypted_key: insufficient parameters specified
[  325.504685] encrypted_key: insufficient parameters specified
18:21:20 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:20 executing program 5:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:20 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e657710656372797074667320d0c192256e841e1dd3c14a757365723a"], 0x1, 0x0)
r0 = add_key(&(0x7f00000007c0)='encrypteZ\x85', &(0x7f0000000700)={'syz'}, &(0x7f0000000800)="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", 0x111, 0xfffffffffffffffe)
r1 = semget(0x1, 0x0, 0x10)
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0)
preadv(r2, &(0x7f0000000600)=[{&(0x7f00000003c0)=""/243, 0xf3}, {&(0x7f00000004c0)=""/67, 0x43}, {&(0x7f0000000540)=""/162, 0xa2}], 0x3, 0x0)
getsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100), &(0x7f0000000380)=0x4)
semctl$GETVAL(r1, 0x1, 0xc, &(0x7f0000000280)=""/193)
add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)="d159b3fba12bb4047172ff49b41a79b8619a3ab68ebb3febe1029eecdf80f6d9a77c662e025d68681a9d5cfa9af18e6ef6a3a22536f9ba374fd9bb0dc5515f33a472f270a317af2098f1ed83041406f004b6d77982d0899f81da2197e9fea190e823fa80219b1f7cf5ce9bd22a64f960152ae4ec25c5284f96f359a1077ba0fcf83c64ec703343d404effaf59da9eee30a1bf8dcdbb2ba4c19bc231a2025", 0x9e, r0)
ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000640))
keyctl$set_reqkey_keyring(0xe, 0x7)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000680)=0x9, 0x4)

18:21:20 executing program 2:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:20 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002)

18:21:20 executing program 5:
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:20 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:20 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:20 executing program 5:
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:20 executing program 1:
add_key(&(0x7f00000001c0)='logon\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000340)="0ce14a8910f314d7751175f9ea0ff9480e49aaa0c7035164945c8b2df443b6d9490395949339962cba1542e74d8e85f002993014a8c5bd1d457be8514410080a158b73e215922f89a999922a3f", 0x4d, 0xfffffffffffffffa)
r0 = request_key(&(0x7f00000003c0)='ceph\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='encrypted\x00', 0xfffffffffffffffc)
add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)="5bcd541a48b4307cedc3b4ec7ccc0eaa9c02c7", 0x13, 0xfffffffffffffffd)
keyctl$instantiate(0xc, r0, &(0x7f0000000480)=ANY=[@ANYPTR, @ANYRES16], 0x2, r1)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4040, 0x0)
ioctl$TCSETA(r2, 0x5406, &(0x7f0000000100)={0x4, 0x8, 0xfffffffffffffffb, 0x100000000, 0x12, 0x7, 0xfffffffffffff801, 0x2f37, 0x1, 0x101})
getpeername$unix(r2, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'team_slave_1\x00', <r3=>0x0})
bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0xf, 0x6, &(0x7f0000001680)=ANY=[@ANYBLOB="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"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000600)=""/4096, 0x41f00, 0x1, [], r3, 0x2}, 0x48)

18:21:20 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0)

18:21:20 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:20 executing program 5:
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:20 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e657710656372797074667320757365723adc7740899180a0d8f3bd6c152fd7ae3583b4e6eeb9a23ff9020d6cf67d6c33c0283b7aec07737015bc7e534eb8b0696b00e3ec1115e25b7c352835482b47fbda38bdc57a4787504e4c99197fe0762bda70bb38325aef55335ccdbe401bf498dd13f95fde2ddcc2e3d3aa0c838aee8c320f70e46cfd0c0868f253f9dc5ee78a3ad6889f2fdb0dcf60283f7a9e90d75e2a7afcf2f4dfc1e37b9e2d3643d55b256ba134854cecb65c8aa3ca9fb80bebda934f42e2fef850c7d133a1b9b7bcaeb5b7a2591fa1de2c3aa9ba0aaa3738b9ffbbe9f35f6febc5ec68103b06be893b8e447c000000"], 0x1, 0x0)
r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0)
ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000040)={0x2})
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  326.083837] encrypted_key: insufficient parameters specified
[  326.096968] encrypted_key: insufficient parameters specified
18:21:20 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:21 executing program 2:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)

18:21:21 executing program 5:
mlockall(0x0)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  326.249289] encrypted_key: insufficient parameters specified
18:21:21 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0)

18:21:21 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
accept4$tipc(0xffffffffffffffff, &(0x7f0000000040)=@name, &(0x7f0000000080)=0x10, 0x80000)

18:21:21 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:21 executing program 5:
mlockall(0x0)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:21 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc40003c123f3188a070")
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0)

18:21:21 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:21 executing program 5:
mlockall(0x0)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  326.682452] encrypted_key: master key parameter 'user:' is invalid
18:21:21 executing program 2:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)

18:21:21 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0)
add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffe)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0xc)

18:21:21 executing program 5:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0)

[  326.733935] encrypted_key: master key parameter 'user:' is invalid
18:21:21 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:21 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:21 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:21 executing program 5:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0)

18:21:21 executing program 1:
ioctl$KVM_ASSIGN_SET_MSIX_NR(0xffffffffffffffff, 0x4008ae73, &(0x7f00000000c0)={0x2, 0x7fff})
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
bind$llc(0xffffffffffffffff, &(0x7f00000001c0)={0x1a, 0x8, 0x7, 0xffff, 0x3, 0xf6, @random="8f45d140b902"}, 0x10)
r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, r0)
r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000040)=0x1)

18:21:21 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:21 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:21 executing program 2:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)

18:21:22 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:22 executing program 5:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0)

18:21:22 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a408944ef99f30faacc70c5ba838c00e6f08ac3117a266d8b20fef2a467c5967ae891602b19db988a77b371235cf3d40fc9dd481bfd6def8c0a1159872ed0a2b2d66c3b7bbf5da44d8ad0cffaf157b17d93e62cf19e"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:22 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40, 0x0)
ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x3, 0xf, 0x2, "1912e30925ac433e3d070ea27b4025ca8e0caea7813f89e2777e3c97c96f0fd2", 0x36734f5a})

18:21:22 executing program 5:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000580)={<r7=>0x0}, &(0x7f00000005c0)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={<r8=>r7, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)
getpriority(0x100080002, r8)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={0x0, r1, 0x2, 0x2}, 0x14)
ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0)

[  327.368234] encrypted_key: insufficient parameters specified
18:21:22 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:22 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:22 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:22 executing program 1:
r0 = openat$full(0xffffffffffffff9c, &(0x7f0000002f00)='/dev/full\x00', 0x80, 0x0)
setsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000002f40)=0x15bf, 0x4)
keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e657710656372797074667320757365723ad9ea03720113c270abb1743a38c1a592071f6266fe638a86e5c8a301dfe9f76be5eab9b82eec77fa626c000244fc3fe3c012bd7c2465bad7d215956b5775a8165fbbf321ab3ea26e346bf17f222b97b52b9e873cf070a4c20090ce785c655760bc086c7b70c5c4d8097e4e37964617ce72fa3968a4ed1bdd679d0b489bdc0304f0cc5f77c22a1f2333bed0fec2976ad6613b11fa80f89332c900ddf4704fa4e93544aa5f8e86fffdf916ce132c7d50fff70b14e21275e65562987a768b62a02cf963703aedc9dc70e8c2396d000000000000000000000000000000ba7510c863"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:22 executing program 2:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  327.726142] encrypted_key: master key parameter 'user:' is invalid
[  327.737436] encrypted_key: master key parameter 'user:' is invalid
18:21:22 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:22 executing program 2:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)
ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000000100)={0x12, 0x0, &(0x7f0000000040)="25f8ad0490bbef20ff351bb80ea127d501fba00ee97874d47b78d77e9817bc98fba9e8434263068045dadf0ea3109c54b7572bca19fb118d61cc46ef9d6eb3cccf0657af2fa2f319447bbc376c9c8d52b7c1b288de223bce3decef9bd297104ac3822193036adac1dc183518ef026f4a8a8f035fd324271049d64a2d279b68645d363a2d1a6557df8b17c730aae42b8c1594e2fe1d885951fe3c9938f036d1c21917a48c68b3", {0x5, 0x100000000, 0x3247504d, 0x3, 0x2, 0x7, 0x0, 0xa3d4}})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

18:21:22 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:22 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()

[  327.867307] encrypted_key: master key parameter 'user:' is invalid
18:21:22 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)
ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000000100)={0x12, 0x0, &(0x7f0000000040)="25f8ad0490bbef20ff351bb80ea127d501fba00ee97874d47b78d77e9817bc98fba9e8434263068045dadf0ea3109c54b7572bca19fb118d61cc46ef9d6eb3cccf0657af2fa2f319447bbc376c9c8d52b7c1b288de223bce3decef9bd297104ac3822193036adac1dc183518ef026f4a8a8f035fd324271049d64a2d279b68645d363a2d1a6557df8b17c730aae42b8c1594e2fe1d885951fe3c9938f036d1c21917a48c68b3", {0x5, 0x100000000, 0x3247504d, 0x3, 0x2, 0x7, 0x0, 0xa3d4}})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

18:21:22 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x701000, 0x0)
write$ppp(r0, &(0x7f00000000c0), 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='schedstat\x00')
ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000040)=0xa0f116335811ac68)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  328.119448] encrypted_key: insufficient parameters specified
18:21:23 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:23 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:23 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()

[  328.282313] encrypted_key: master key parameter 'user:' is invalid
18:21:23 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0)
ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f0000000040)={0x7})

18:21:23 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:23 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
gettid()

18:21:23 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  328.545250] encrypted_key: master key parameter 'user:' is invalid
[  328.566475] encrypted_key: master key parameter 'user:' is invalid
18:21:23 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:23 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff)
add_key(&(0x7f0000000140)='syzkaller\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000001c0)="cfb481d0a0c7a5e4a792aa0943565a59a3e3640d92d2522b366d5c6fab49f5b6c699dcc2cffe542be0f03fa7e522db7e0aabb2637ef7865fda555b322ced6997e4816c7844b27f8f625de6228bee973b951a14ceb47eee460939c68b89772d5e64312788e2d8c0b7bf6fa97a7c6ea48ea32463f4717012d97be1978f3acb62193b53614b1174b93c257c55c2a5b57825fb5c1a5025f986a45154eff1ba4121de0ac63d3fab50c2963452e94f4e833e96c7f295e295530b8987f8c11056683be6526edf033497b4992f9062eb64d4810616f5c528087cb5265f1c97bd60e68ebdcd4b847061027fcf83", 0x4b, r0)

18:21:23 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:23 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)
ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000000100)={0x12, 0x0, &(0x7f0000000040)="25f8ad0490bbef20ff351bb80ea127d501fba00ee97874d47b78d77e9817bc98fba9e8434263068045dadf0ea3109c54b7572bca19fb118d61cc46ef9d6eb3cccf0657af2fa2f319447bbc376c9c8d52b7c1b288de223bce3decef9bd297104ac3822193036adac1dc183518ef026f4a8a8f035fd324271049d64a2d279b68645d363a2d1a6557df8b17c730aae42b8c1594e2fe1d885951fe3c9938f036d1c21917a48c68b3", {0x5, 0x100000000, 0x3247504d, 0x3, 0x2, 0x7, 0x0, 0xa3d4}})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

18:21:23 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:23 executing program 2:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:23 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0)
setsockopt$inet6_int(r0, 0x29, 0x5f, &(0x7f00000001c0)=0x4, 0x4)
r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80, 0x0)
getsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000200)=""/29, &(0x7f0000000080)=0xfffffffffffffe58)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:23 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:23 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  329.140842] encrypted_key: master key parameter 'user:' is invalid
18:21:24 executing program 1:
r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x501000, 0x0)
ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0)
r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9)
keyctl$instantiate(0xc, 0x0, &(0x7f0000000500)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYBLOB="d083fb8b8f78ffc09fe560f57216c88a3742745b0cbbfe5ad7fe7e7936ab39c954b0e6991a02d338505b0b0eeb0d46b91ebbeaccefe09437473b3ccd443175036563b5f35a44f994b55e71a086520d3c91e413fa6ef5cebb5105faca337ad016b034ef205c42f005c61811f317cc81753094521e021d0e1a082367057c7ec740a8a4e76550855e4b368340c364cb49071d51a69c1cfd07d08c7a7685dddd419babfff26ee244c7ec2ddf2822ddc6fa6398e97834ff4b8e0926302cb9c47ee64d613fc060eb17", @ANYBLOB="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", @ANYRES16=0x0, @ANYRES16=r0, @ANYRES32=r0, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESOCT=r0], @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="5eb249037f37bb864d0d5cb039aedb2ad9e1543f770c3139b0e8e743091af5314dd8bcad21b82bd060d73f1c009876ee0b7cefc5406777154f4b98f3888d40ce87d10c0fd146870423ac21725f4e249d27af47e1d01ac00ea435c641705a05a16451c42c6c760ddf906759163c7f0c5a0224", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRES64=0x0, @ANYPTR], @ANYRES32=r0, @ANYRESDEC=r0], @ANYRESOCT=0x0, @ANYRESDEC=r0, @ANYRES64=r0, @ANYRES16=r0, @ANYRES16=r0, @ANYRES32=r0], 0x8, r1)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xffffffffffffffa8, 0xfffffffffffffffe)
setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040)=0x4, 0x4)

18:21:24 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:24 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r4 = openat$cgroup_int(r3, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r4, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r6 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r4)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:24 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:24 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='e\b\x00'], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000001c0)="940ef439464645d0cba3270997146d85a09f9f6f02a6fae710dcbac80f7ca1c1225d6664c0055d3d8eb20539854c83017006a41cd481f43b1c94c8de978e5942cb610130f8c8cf4f5267c51c95d4491206ad0342eb2cbf895d14fc22f80d4f1e1cf3a21707c17d6154d22b9c48d25f770866843b7408e967e637121dc216007decaf07cd06426328759301d96d3063d1aa5f0d150eb165c283800d6bb58d6547a4b6007e38b4ab10afa63a70c70a7d3104c1a920661fcb86fa1379dd842ee8d1f71bfa311d98791ea9a8e0824a22bcff20dd21c326ebf903adc997034ca719dae0115699fabaee004cb6ad1c11b66cacf4043333cfa413f9c1564a9b305cfedd738813a981ddc5417203bfcda9ac8867f25f66c848dd3c46ab1e584f827c5acc91834eaa50d001b857f9d0b0da1bcbe0077825fcbbdc0d60ece8a065b97d1d16cac4e6496b2f8fac901d5227e632c8233d70f2e803270d20691f6df5772105f4e3ba5fa442090921720f7344d599d26a947bed8f63503863e51826e3cd2b41480c0931e2c8aaa8ff688426fc8f9f91dc20d0714c5c912fffa38b0b847de31b14cc1cbec05f12309c7d0ace1bc865c61322ce90e2d3772bb741e85723570a139827360f81dc144084b2ca74501ca12f8047e6267620e2d9e095bef82c1b3dab4940ef65f3cf35bd3f8ab2ec4325be0667fe7d3905e0db8b09c15b5ae2e35327c7b2966885f8fb118a07a1e7b2f446997de9cd8a386cb81b7b1f197c66534ac1df8a57eb5d80b969a65e4ffb45b96fbcace79cc0d4b3af179221ffac1757d2c2362220063fed1e050171e1faad802341de88284e0d2af758e095592074e9a3bf5d3132a9392f48f8d9c39029050ae4a7a593822a614b3df11afe2cd882c1765af5c8fbe0ae95c18ec715ea51ac2f512db14fb1250564bde5c5943162be8ae9e15d3e210069142ce0816668a8a158c7f521c2cf5faaed1e9b8db17a2cc6291784e306c4e697a450d980896d85a0f6b7811cfeab71848ac67b27bbc4e736671c1e1b304fb32cb9840a4f739698655c7f0e56a94e0473a434f740c0981da2d18a06aa1efffc71b98bec3baffccb22ec61852b895bb6cfa4c3820b9d807e6ce0dc189099e4fea8d1e5d7c424ff9cc789104ae1bcac1a11487abc176ff55247edd2499cbd3e35ba8fa2b06448ce1cbecec47fb73a5653d6e30117c758bb7d2b097f00b4669cd1d0ebf038cbe45526c920720bb2bc98faf2166b8fa3f71ce0ab8164b13928e12c7a314df64813ceddb29e8d57626deef89c8aa2217bafb64f0b294d67f87535fb9135f36975e2e65848f0520c1ecd310a0491224c49a1d45e1fc35ebbd8dc2174a2b3f6400e9c24bf0160fb82185ff45449e8ddb4be98b05153cc37008e26308e392e33c5e3abe2c077d5f9f93eeba19c10bde983aeda7f1a16497793db73680f6485d4d1754a8eb4e507979e2879aee2cfe9e5422e23071f232d00f9ad6198dc93e3e54834d511d09b0d0f5d5f76bf5b1f8aabc56c831c2bb704345a8bd0219fe94605b946c95c397806f33a481af64316961aab71bfa3b1ff12f58c324da3db4bd2f48b1f693f6d7172a2fdea81f1d43e89066b57e461bb7a14e2519609a7f57bab7f11edf2f362991a3e1199d5e9b5e02a49e01747c0e6358560c37982742de5ba90a4935daa63d02e6a2bf020c44225888dd3ffcf035a42ecb0af3e50766a394d89fc10dacad969046a034e5a0783bfe0a4113e3b74a68078bbf14a143fa2e90a76a4c9a9ea5c80a5f9e94f404c35f2f714f859150ea04b60b7563860ec0ab13c9e6be917822173de3e9956aad213fc82216282ef7755ddfd8b7aa5ed5f458620c266cc9ba9a716dbaf1cf758d31c66595e0d03f9bd4738b82c2b8eaf2aec14a395fa38031c828836138a04dad595431e3e4679dfe6fe0a030c9d59471668fda182555b6d8bc69e609721158d0472800f54ff289fe8ab4e4e8a3396cf8099a62360cb8f578128448a5fc40e4223b93ef5679681e3453b4f6c64dbcfd70ba34482dbae28e6637eb4f90517fdd0d64a11e7d158fc4edad66d4f2f1e928cf2942d16c159b754f6cd7bb4f8626cd64b6880a5dc2df42cba755bceb5a42c308782b40dd6ed240d1827450ecf1d5e380cdb2c8c2cf1547ff9f585cd0cf15f843cdd6be66089db3f6e57919d6dd623696af09cd389e80cbd76a2e4d1991776771e74c7f3c32fffa7af78b6d97fa4da9a42a92d63d481fe7cecfd734edb3e4227e60c4b991f42b8e6ba351d31b16b162f4b3aaafe2644d5b81d33cb00caeefd6ce9391a18f0b3900893cb06a2a235170729e651e3e4b179628daef39e594482ad6a9756665888d53a7083b95eabeaaa562a9f2451e8cc4fac83382c79e4eb9430e10d0044aeae5fde1cbe4142a6acf5c61a213a5f2d4c6ecc976390aa853765a0ab221c0672f0c13bbc4b48104c1aa08461301e3481193e181070e15d058e6c14ccc61400b6ca20e78f548f99df4e7a15e667acfeeded34e5f34dada5d149a0d266f295bc30bf4fffe2c924f0f9fd1124c76166f9b96059de9ab043414dab279ad4a33d26cf99c3d697dfa64fd5e8727dfade546c04026a744e30f171cacab8193c2bb4a4089e2be9d86da26c372b7e8e5dd9035f927858c7870596d587e9cb033afc774869105b58d990110a9a2099d080e6bc3b7a73a3075d70c8911d4823774db0071449b04c2309a389a2bb519d56cad1f1b5735c829382a83be6893999d4423f42ba4c21cf6b2f0c6f4004e9c56ac5252c3e8a288d45dd27c14ee0fff30b2e18c3bdb488b9f99335c428cb9ac569132c3270069b90a9e70b99d343e3e9201d08537eff1170bf4055fb412114d090cd0abb7b9638ae6522dec0f374ae2585b92ae988ac16d49863a847b3bdcf19761d77d967152c0e29d55019540f8c8904b9f578275271b44fab15643ca4ba81720355481a53c4c67d4bf2ad5cf30119faffafeb2b59290f839b933ec08f2902c5f469b7e0965c1e24df5e3aae5e97b0ba6cc8bf64e96eb8c61e18a303abab5336f3d6cf003175ced1fabd62ab221098b84548d9806a7a1a5280134a4836f7e265207b13dc96482c39207df165e0fd798462156b10f82c423cc89fdaed51a069e40fec3d69fe21d9ed9efb0c3a2e0256afa4e03d1df21a312111e3c96384f8071df280fba86e2deb47a786d41e6d4e48300169928af9dbd5002da16945bdee3914c041593c4b4ebef3f76dcee02cb644b29dce4f6a2af516cb246421679f6a7540a7f48917d41ae26cfcf452ccea2370c498397d4c57d668cb741e60666faf10eb34d729fa40908ac5c08d736aca10ce4e381755ffe573ab55d2db8b8dab6d17ff61acaed8188e0e02d049390f092ffc68b78a26e8a0e55c01ed044e34ab70bb781cd2c179c4424d53766259f1aed24528d931fd9f99f44c65b0a10d3793958e93979ab4dd82d5ee688271851412ef101e91d51f1b7ac13105a6c2ea29905f8cd65d6675fe8850f3c9415e7462d71da4a3e08634a679597ab37eb006a75bc8d2d695611bb89096228e92da75e7aba86f54cdf9954458bb50f4ea30298f700aa41202f21e06e67b6e57a96887f37f56c27b5302fba55e1bbaedff67add3c9f2210ad8ca0dd993b73bf3f2e5b302669376a3586bb13e9f8e1475a2c11c1e67b08d83f1caaa83e8e8804fd60ef1a34958d02df38855290cb14fcb1abcce947f9ba09c59f492eb3893d9ce3492cf003cd1f3d1294b345beeed2772aa18fcf6df22a519e091f13b14af0e325107585ec03574746d95f914ea7992f969db9efeab3044487d224c50635f7198575efd0039ac8f8d4382c50e0792588afcc132143e15b4058749b5b67898e51163e17148c1401af89f1ccb5e6c411611e1e561200d2b53987ab086651c472a7470e05b28b7f381181e6fe18632abe9a2a2dc22abde8e0e90cfe0d52c8c85f47072dc950a8ce98e07286d02163229b837f78456d994e83bd167906bf9c7380859e90ca1dcd51fa1c5ea16e7fff4c4d94cd7bc4937fa6eb068245413206b8bd5bbfc76df8a6cb0e18eed8455a45fbde9adf14053ae91836c906f4dc5a077caa44739e99cfb4bc34e3e6aa85ebde14f5efd3255f96f6bb1119bc5b3620876d1592466fde5e71a4fe73e535dde49127c7a8350b16ec70ed021a94b978f3aa4753f5286dc46690e797e7d60d22232c40fb44373e3eba86e51acf03af15bdd9d159429d335d13c433a7d6c90ad31569bd599d315b2151db87cb937ca619590a1b9948d733bd60ff253532cca7750205968acdb167e18eebd468718b2d34d645c21136c1427f1359aefac9f65effc4fedbe8a9b335c06266a19c0ec6e9e6b8b6726f2f9956ce62df6388c1b589c37e45341eb8609efb3fca5a8f6372705ce789617536b264ca3f5e06ac27d62ba986bdbbc80c0ec25054f9411c2e3800c8a3c1fce1592167834d30554fec0936bf223bc31b8a4afe7bc66ee6ccd26097782f2751c4351e3e6586002e1556a0677f102978a47fbe5831b4c98a7d3d909fde1c63192cc50914255b820dffe1432a1c09bebf441590f5571c505af16d771f3be5ac59ddde9d642e4277a6122d53c6e4d4acbc4883f41d02cb05ee9535dfe81e94605aa07ebdb6e11d6522df026ccc375800a34b2fd69123a813f379bd04f16c8b37fcb010439137e519b4dd4cb9b77e154f6b4ab102d473c2f4a4ff534e81ba575e8d3cfee7da4a4c76785115f0839fcd7cc7e37d4dff68df35849d106ccdf02532c7eb65c6764176bf026c014a6088c01237fbaf54849f88283eefa925e37e625f1d02df29c813092382319eb508323bd65d8050d166c51c9bb40266650fe65ba5bc48aa1b050c392869032b73cf07777b64e681a0d2c1d52cfb34a79be19985d8d6c454471c40d88fc7935c15d5ea141841a3fbe91e5f0e73b8d706e61f7423766903c7a43ab51bc8853ee8080d0b09fa9249b103fd0b24fd88bfde8899e77c31c24e8ef3d26b746004627a6bbdccbfbc27f2d579c49351fa774d63cbd5cfe19f5498639daaf7b48fbbeb5fca371488cc3340f74e825bceda3473d0ebdf6557e6a8bde7f45fe83806ac8bc85e21971414a82a7e5a193c15d4420bcdbc09dca9e91610bab10b5067f46ac769b7e1cff5cbcd959ccda8053d5b1783e72e8f36ce82236ebce1d3a7e9371308d60815b87d4e47b6c604ea3a89aabf90f8789bc0e8ae358d19a7afc9a4801485c7e0388e3b8fb474b9491644c693b7cc759bd0b680d8e09ba8f66b122fdbc9131ac345785731a0d2c31697714a299bf5db6cde89ac10f99ad5636c5b8f63b3a4d03d9541bfe691f34eb61ff123f29567af7f802c225bbec757ef69730b5312df603607ba10f4d6420ce73587350eed31f30a49da2fc8d8fd0bf99f10156fea58809dd7df7e90e36a2958f4b7480f8129527ef61cb0e2aa11de5b7cc4c364fc51d797d0a412043f2ca204f72afe169be26ba06cb5f77ec526d8253b269148b3446899f351ed4d2445f75bd4a3746b7e27dc5b146cf7f28bddd93e059d1ef228543d9eac948639dce4719165a6ac9e26664767b27d170a8b46ae905f36b0f1fbd5818c18694db081b2db09107f0f391d24f285e06dc1036b1a3b3f8a9cf3d8ffb916e62490d8b8d49ff02d95e33a5ecb72490e41b7c764448ffc9b3990a4dc6b2abae39f1a6009914a7c4c2888e743762a19e023e0e77c2f4c1e53b259298cf5b0eb6e86f7a7973240683ab14e9ff687ca7b41cf8d82e7b92a8929381e070ca2395", 0x1000, 0xfffffffffffffffb)

18:21:24 executing program 2:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  329.508002] encrypted_key: insufficient parameters specified
[  329.518917] encrypted_key: insufficient parameters specified
18:21:24 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)
ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000000100)={0x12, 0x0, &(0x7f0000000040)="25f8ad0490bbef20ff351bb80ea127d501fba00ee97874d47b78d77e9817bc98fba9e8434263068045dadf0ea3109c54b7572bca19fb118d61cc46ef9d6eb3cccf0657af2fa2f319447bbc376c9c8d52b7c1b288de223bce3decef9bd297104ac3822193036adac1dc183518ef026f4a8a8f035fd324271049d64a2d279b68645d363a2d1a6557df8b17c730aae42b8c1594e2fe1d885951fe3c9938f036d1c21917a48c68b3", {0x5, 0x100000000, 0x3247504d, 0x3, 0x2, 0x7, 0x0, 0xa3d4}})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

18:21:24 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:24 executing program 1:
r0 = request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='\x00', 0xfffffffffffffff9)
request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='syz', 0x0)
r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)="1ac265fa", 0x4, 0xffffffffffffffff)
keyctl$instantiate(0xc, r1, &(0x7f0000000300)=ANY=[@ANYBLOB="87379f076ecd445d6299e9907e7e334c7e81b5cd6e7962cf322fc279181d3d58f1a4d57918a6eb6bef60f2b0a94e6d5b34b646d63a346a487b89586baf21c15dd190bc93e1a426e6f70abe0e88524a888ecd1597b5cbc2517d08822db46d34ce12a6919a28db0ba26bf33ca8c41109a7237a3027da63652a08eec0c42384275c8114773172ed3f1b1e1e7dae3512e6541f31534ede8b18ba", @ANYRES16], 0x2, r0)
pipe(&(0x7f0000000000)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
mq_getsetattr(r2, &(0x7f0000000040)={0xf89, 0xa2d2, 0x10001, 0x3d, 0x4, 0x7, 0x3ff}, &(0x7f0000000080))
ioctl$TIOCGPTPEER(r3, 0x5441, 0x8)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:24 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:24 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:24 executing program 2:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:24 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:24 executing program 1:
r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2, 0x0)
ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000040)={0x9, 0x80000001, 0x5, 0x400, 0x6, 0x8, 0x9})
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65771065ffff000000000000757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  330.054809] encrypted_key: insufficient parameters specified
18:21:25 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:25 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  330.212841] encrypted_key: insufficient parameters specified
18:21:25 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
keyctl$search(0xa, r0, &(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, r0)

18:21:25 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

[  330.370719] encrypted_key: master key parameter 'user:' is invalid
[  330.378169] encrypted_key: master key parameter 'user:' is invalid
18:21:25 executing program 1:
r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3f, 0x2)
r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00')
sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x2c, r1, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x32}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800)
keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e65771065637265723a1314dc8a57c7235ed7053ba107f8a758c3ca32d0fd0a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
prctl$PR_CAPBSET_READ(0x17, 0x13)

18:21:25 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)
ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000000100)={0x12, 0x0, &(0x7f0000000040)="25f8ad0490bbef20ff351bb80ea127d501fba00ee97874d47b78d77e9817bc98fba9e8434263068045dadf0ea3109c54b7572bca19fb118d61cc46ef9d6eb3cccf0657af2fa2f319447bbc376c9c8d52b7c1b288de223bce3decef9bd297104ac3822193036adac1dc183518ef026f4a8a8f035fd324271049d64a2d279b68645d363a2d1a6557df8b17c730aae42b8c1594e2fe1d885951fe3c9938f036d1c21917a48c68b3", {0x5, 0x100000000, 0x3247504d, 0x3, 0x2, 0x7, 0x0, 0xa3d4}})
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)

18:21:25 executing program 2 (fault-call:1 fault-nth:0):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:25 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:25 executing program 0:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:25 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  330.915027] FAULT_INJECTION: forcing a failure.
[  330.915027] name failslab, interval 1, probability 0, space 0, times 0
[  330.943678] CPU: 0 PID: 11862 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  330.947100] encrypted_key: insufficient parameters specified
[  330.950806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  330.950815] Call Trace:
[  330.950845]  dump_stack+0x172/0x1f0
[  330.950873]  should_fail.cold+0xa/0x1b
[  330.962164] encrypted_key: insufficient parameters specified
[  330.966010]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  330.966029]  ? lock_downgrade+0x810/0x810
[  330.966050]  ? ___might_sleep+0x163/0x280
[  330.966089]  __should_failslab+0x121/0x190
[  330.966111]  should_failslab+0x9/0x14
[  330.966127]  kmem_cache_alloc_trace+0x2d1/0x760
[  330.966147]  ? kasan_check_read+0x11/0x20
[  330.982012]  do_shmat+0x5c6/0x1090
[  330.982042]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  330.982059]  ? fput+0x128/0x1a0
[  331.023768]  __x64_sys_shmat+0xd1/0x170
[  331.027766]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  331.032531]  ? do_shmat+0x1090/0x1090
[  331.036341]  ? lockdep_hardirqs_on+0x415/0x5d0
[  331.040931]  ? trace_hardirqs_on+0x67/0x230
[  331.045266]  do_syscall_64+0x103/0x610
[  331.049161]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  331.054469] RIP: 0033:0x457e39
[  331.057663] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  331.076609] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  331.084317] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  331.091588] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  331.098855] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  331.106129] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
18:21:25 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  331.113435] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
18:21:25 executing program 2 (fault-call:1 fault-nth:1):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:25 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
getpriority(0x100080002, 0x0)

18:21:26 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:26 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  331.316179] encrypted_key: insufficient parameters specified
[  331.339656] FAULT_INJECTION: forcing a failure.
[  331.339656] name failslab, interval 1, probability 0, space 0, times 0
[  331.391436] CPU: 0 PID: 11886 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  331.398576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  331.407929] Call Trace:
[  331.410527]  dump_stack+0x172/0x1f0
[  331.414181]  should_fail.cold+0xa/0x1b
[  331.418078]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  331.423172]  ? lock_downgrade+0x810/0x810
[  331.427313]  ? ___might_sleep+0x163/0x280
[  331.431455]  __should_failslab+0x121/0x190
[  331.435680]  should_failslab+0x9/0x14
[  331.439465]  kmem_cache_alloc+0x2be/0x710
[  331.443612]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  331.449150]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  331.454673]  ? check_preemption_disabled+0x48/0x290
[  331.459694]  __alloc_file+0x27/0x300
[  331.463423]  alloc_empty_file+0x72/0x170
[  331.467488]  alloc_file+0x5e/0x4d0
[  331.471019]  alloc_file_clone+0x26/0xc0
[  331.474985]  do_shmat+0x63f/0x1090
[  331.478559]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  331.483307]  ? fput+0x128/0x1a0
[  331.486580]  __x64_sys_shmat+0xd1/0x170
[  331.490559]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  331.495303]  ? do_shmat+0x1090/0x1090
[  331.499091]  ? lockdep_hardirqs_on+0x415/0x5d0
[  331.503684]  ? trace_hardirqs_on+0x67/0x230
[  331.508023]  do_syscall_64+0x103/0x610
[  331.511914]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  331.517134] RIP: 0033:0x457e39
[  331.520328] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
18:21:26 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
r0 = request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='syz', 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x0, r0)

18:21:26 executing program 2 (fault-call:1 fault-nth:2):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  331.539228] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  331.546917] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  331.554296] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  331.561549] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  331.568803] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
[  331.576059] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
[  331.761511] FAULT_INJECTION: forcing a failure.
[  331.761511] name failslab, interval 1, probability 0, space 0, times 0
[  331.761534] CPU: 1 PID: 11904 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  331.779853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  331.779858] Call Trace:
[  331.779882]  dump_stack+0x172/0x1f0
[  331.779902]  should_fail.cold+0xa/0x1b
[  331.779919]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  331.804412]  ? lock_downgrade+0x810/0x810
[  331.804431]  ? ___might_sleep+0x163/0x280
[  331.804454]  __should_failslab+0x121/0x190
[  331.804472]  should_failslab+0x9/0x14
[  331.812742]  kmem_cache_alloc+0x2be/0x710
[  331.824910]  ? rcu_lockdep_current_cpu_online+0xe3/0x130
[  331.830375]  ? __alloc_file+0x27/0x300
[  331.834282]  ? rcu_read_lock_sched_held+0x110/0x130
[  331.839313]  selinux_file_alloc_security+0xb4/0x190
[  331.839333]  security_file_alloc+0x69/0xb0
[  331.839351]  __alloc_file+0xac/0x300
[  331.839368]  alloc_empty_file+0x72/0x170
[  331.848601]  alloc_file+0x5e/0x4d0
[  331.848621]  alloc_file_clone+0x26/0xc0
[  331.848640]  do_shmat+0x63f/0x1090
[  331.848662]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  331.872179]  ? fput+0x128/0x1a0
[  331.875476]  __x64_sys_shmat+0xd1/0x170
[  331.879466]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  331.884235]  ? do_shmat+0x1090/0x1090
[  331.888047]  ? lockdep_hardirqs_on+0x415/0x5d0
[  331.892627]  ? trace_hardirqs_on+0x67/0x230
[  331.896936]  do_syscall_64+0x103/0x610
[  331.900812]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  331.906002] RIP: 0033:0x457e39
[  331.909181] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  331.928090] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  331.935796] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  331.943049] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  331.950309] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
18:21:26 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)
ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000000100)={0x12, 0x0, &(0x7f0000000040)="25f8ad0490bbef20ff351bb80ea127d501fba00ee97874d47b78d77e9817bc98fba9e8434263068045dadf0ea3109c54b7572bca19fb118d61cc46ef9d6eb3cccf0657af2fa2f319447bbc376c9c8d52b7c1b288de223bce3decef9bd297104ac3822193036adac1dc183518ef026f4a8a8f035fd324271049d64a2d279b68645d363a2d1a6557df8b17c730aae42b8c1594e2fe1d885951fe3c9938f036d1c21917a48c68b3", {0x5, 0x100000000, 0x3247504d, 0x3, 0x2, 0x7, 0x0, 0xa3d4}})

18:21:26 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:26 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000440))
getpriority(0x100080002, 0x0)

18:21:26 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:26 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc)
r0 = request_key(&(0x7f0000000280)='id_legacy\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)='^\x00', 0xfffffffffffffffc)
r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/video1\x00', 0x2, 0x0)
ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000740)={0x0, 0xd81, 0x8, [], &(0x7f0000000700)=0x8})
keyctl$negate(0xd, r0, 0x4, r0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, <r2=>0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x80)
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00')
sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000680)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000640)={&(0x7f00000003c0)={0x26c, r3, 0x208, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xc144}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xef75}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}]}, @TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffc1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1200000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffbdc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6851716d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffa6b28}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}]}, 0x26c}, 0x1, 0x0, 0x0, 0x40}, 0x40000)
r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
write$P9_RLOPEN(r4, &(0x7f00000000c0)={0x18, 0xd, 0x1, {{0x2, 0x3, 0x3}, 0x3}}, 0x18)

[  331.957581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
[  331.964849] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
18:21:26 executing program 2 (fault-call:1 fault-nth:3):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:26 executing program 1:
r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="35be95d6747b1d3e6c0b28ef7039644741bf5f6791b9060d06e78d61ab2267abd01307603fd8624a9253ebaa62e1eea7cbadce63e585ab7c710734759631105094a6ea06943bcf47c8f4408b96950657d704075fd27c465a8b6178b2e933840fed7abc07df65a351475d16a0cd270702137e71724e3754b859ba8007e4", 0x7d, 0x0)
keyctl$instantiate(0xc, r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x1, 0x2)
ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000200))
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
prctl$PR_CAPBSET_READ(0x17, 0x16)
r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00')
sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r2, 0x100, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x24004091)

[  332.017829] encrypted_key: master key parameter 'user:' is invalid
[  332.044185] encrypted_key: master key parameter 'user:' is invalid
18:21:26 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r3)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:26 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000440))
getpriority(0x100080002, 0x0)

[  332.161556] encrypted_key: master key parameter 'user:' is invalid
[  332.174034] FAULT_INJECTION: forcing a failure.
[  332.174034] name failslab, interval 1, probability 0, space 0, times 0
[  332.199343] encrypted_key: master key parameter 'user:' is invalid
18:21:27 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0)
ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000040))

[  332.213742] CPU: 1 PID: 11927 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  332.220880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  332.230236] Call Trace:
[  332.232862]  dump_stack+0x172/0x1f0
[  332.236500]  should_fail.cold+0xa/0x1b
[  332.236523]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  332.236543]  ? lock_downgrade+0x810/0x810
[  332.236564]  ? ___might_sleep+0x163/0x280
[  332.245546]  __should_failslab+0x121/0x190
[  332.253829]  should_failslab+0x9/0x14
[  332.253844]  kmem_cache_alloc+0x2be/0x710
[  332.253860]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  332.253891]  ? selinux_is_enabled+0x43/0x60
[  332.261891]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  332.271546]  ? mpx_unmapped_area_check+0xd6/0x106
[  332.281377]  vm_area_dup+0x21/0x170
[  332.289886]  __split_vma+0xad/0x570
[  332.293524]  ? find_vma+0x30/0x170
[  332.293543]  __do_munmap+0xca1/0xef0
[  332.293571]  mmap_region+0x227/0x1760
[  332.293584]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  332.293604]  ? __x64_sys_brk+0x760/0x760
[  332.301000]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  332.301016]  ? get_unmapped_area+0x295/0x3b0
[  332.301036]  do_mmap+0x8e2/0x1080
[  332.310362]  do_shmat+0xe09/0x1090
[  332.310388]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  332.319957]  ? fput+0x128/0x1a0
[  332.319983]  __x64_sys_shmat+0xd1/0x170
[  332.327817]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  332.327835]  ? do_shmat+0x1090/0x1090
[  332.327853]  ? lockdep_hardirqs_on+0x415/0x5d0
[  332.336123]  ? trace_hardirqs_on+0x67/0x230
[  332.336143]  do_syscall_64+0x103/0x610
[  332.336164]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  332.336178] RIP: 0033:0x457e39
[  332.343410] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  332.343419] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  332.343437] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  332.356544] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
18:21:27 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:27 executing program 2 (fault-call:1 fault-nth:4):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  332.356554] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  332.356562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
[  332.356571] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
[  332.531118] FAULT_INJECTION: forcing a failure.
[  332.531118] name failslab, interval 1, probability 0, space 0, times 0
[  332.548172] encrypted_key: master key parameter 'user:' is invalid
[  332.575017] CPU: 1 PID: 11942 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  332.582163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  332.582171] Call Trace:
[  332.582199]  dump_stack+0x172/0x1f0
[  332.582225]  should_fail.cold+0xa/0x1b
[  332.582245]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  332.597799]  ? lock_downgrade+0x810/0x810
[  332.597821]  ? ___might_sleep+0x163/0x280
[  332.597845]  __should_failslab+0x121/0x190
[  332.597865]  should_failslab+0x9/0x14
[  332.607111]  kmem_cache_alloc+0x2be/0x710
[  332.607130]  ? __do_munmap+0x8a0/0xef0
[  332.607157]  vm_area_alloc+0x20/0x110
[  332.607174]  mmap_region+0x964/0x1760
[  332.607188]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  332.607215]  ? __x64_sys_brk+0x760/0x760
[  332.607233]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  332.615510]  ? get_unmapped_area+0x295/0x3b0
[  332.615533]  do_mmap+0x8e2/0x1080
[  332.615561]  do_shmat+0xe09/0x1090
[  332.615591]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  332.615611]  ? fput+0x128/0x1a0
[  332.623638]  __x64_sys_shmat+0xd1/0x170
[  332.623656]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  332.623674]  ? do_shmat+0x1090/0x1090
[  332.623691]  ? lockdep_hardirqs_on+0x415/0x5d0
[  332.623709]  ? trace_hardirqs_on+0x67/0x230
[  332.623730]  do_syscall_64+0x103/0x610
[  332.623761]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  332.631788] RIP: 0033:0x457e39
[  332.631805] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  332.631814] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  332.631830] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  332.631839] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  332.631848] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  332.631858] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
[  332.631870] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
[  332.643738] encrypted_key: master key parameter 'user:' is invalid
18:21:27 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)
ioctl$VIDIOC_S_FBUF(r6, 0x4030560b, &(0x7f0000000100)={0x12, 0x0, &(0x7f0000000040)="25f8ad0490bbef20ff351bb80ea127d501fba00ee97874d47b78d77e9817bc98fba9e8434263068045dadf0ea3109c54b7572bca19fb118d61cc46ef9d6eb3cccf0657af2fa2f319447bbc376c9c8d52b7c1b288de223bce3decef9bd297104ac3822193036adac1dc183518ef026f4a8a8f035fd324271049d64a2d279b68645d363a2d1a6557df8b17c730aae42b8c1594e2fe1d885951fe3c9938f036d1c21917a48c68b3", {0x5, 0x100000000, 0x3247504d, 0x3, 0x2, 0x7, 0x0, 0xa3d4}})

18:21:27 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="38f1559f648b2a43faeb6f95200672134d2fd731a2fda023d4f69a5674eef2512246f71157cfaaeaf78e9acbd381f1df119617cd8652e792e36e5d1cad0c8ad9f3ea4ca1f32137af62d82b0759a4923f1cf0ed1a0ef2e901ae65b634cc32e69b80a2ba32fa3a1e3f52b5129c97f5", @ANYRESDEC, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESHEX=0x0, @ANYPTR64, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRES32=0x0, @ANYRESOCT, @ANYRESHEX, @ANYRES16, @ANYBLOB="e8ea694967bb1635d595331c4dfb41179d8d085e84875f1408a2123657c2dea54b848596d0771237b50ef3184fd3827669edee15c083"]]], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x10000, 0x0)
r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x400, 0x0)
ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000300)={0x5, r1, 0x2})

18:21:27 executing program 2 (fault-call:1 fault-nth:5):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:27 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r3)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:27 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000440))
getpriority(0x100080002, 0x0)

18:21:27 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  333.015435] encrypted_key: insufficient parameters specified
[  333.021958] FAULT_INJECTION: forcing a failure.
[  333.021958] name failslab, interval 1, probability 0, space 0, times 0
[  333.055601] encrypted_key: insufficient parameters specified
[  333.063150] CPU: 1 PID: 11963 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  333.070263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  333.070271] Call Trace:
[  333.070305]  dump_stack+0x172/0x1f0
[  333.070330]  should_fail.cold+0xa/0x1b
[  333.070352]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  333.070372]  ? lock_downgrade+0x810/0x810
[  333.070394]  ? ___might_sleep+0x163/0x280
18:21:27 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c, 0x800)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x6, [<r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c)
getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r1, 0x400}, &(0x7f0000000200)=0x8)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

[  333.085963]  __should_failslab+0x121/0x190
[  333.085985]  should_failslab+0x9/0x14
[  333.086000]  kmem_cache_alloc+0x2be/0x710
[  333.086018]  ? file_remove_privs+0x480/0x480
[  333.086032]  ? touch_atime+0xe9/0x2a0
[  333.086047]  ? atime_needs_update+0x5f0/0x5f0
[  333.086068]  __khugepaged_enter+0x3b/0x390
[  333.086088]  shmem_mmap+0x27b/0x300
[  333.095066]  shm_mmap+0x101/0x240
[  333.095089]  mmap_region+0xc37/0x1760
[  333.095119]  ? __x64_sys_brk+0x760/0x760
[  333.095137]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
18:21:27 executing program 2 (fault-call:1 fault-nth:6):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  333.095153]  ? get_unmapped_area+0x295/0x3b0
[  333.095176]  do_mmap+0x8e2/0x1080
[  333.103460]  do_shmat+0xe09/0x1090
[  333.103492]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  333.103510]  ? fput+0x128/0x1a0
[  333.103535]  __x64_sys_shmat+0xd1/0x170
[  333.103552]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  333.103570]  ? do_shmat+0x1090/0x1090
[  333.103586]  ? lockdep_hardirqs_on+0x415/0x5d0
[  333.111603]  ? trace_hardirqs_on+0x67/0x230
[  333.111625]  do_syscall_64+0x103/0x610
[  333.111647]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  333.111660] RIP: 0033:0x457e39
[  333.111676] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  333.111685] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  333.120231] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  333.120241] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  333.120250] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  333.120260] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
[  333.120270] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
18:21:28 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:28 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47744279}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r3)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  333.401831] FAULT_INJECTION: forcing a failure.
[  333.401831] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  333.404635] encrypted_key: master key parameter 'user:' is invalid
18:21:28 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getpriority(0x100080002, 0x0)

[  333.480111] CPU: 1 PID: 11979 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  333.487251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  333.487258] Call Trace:
[  333.487291]  dump_stack+0x172/0x1f0
[  333.487316]  should_fail.cold+0xa/0x1b
[  333.506723]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  333.511851]  ? ___might_sleep+0x163/0x280
[  333.516023]  should_fail_alloc_page+0x50/0x60
[  333.520525]  __alloc_pages_nodemask+0x1a1/0x710
[  333.525202]  ? __save_stack_trace+0x8a/0xf0
[  333.529538]  ? __alloc_pages_slowpath+0x2900/0x2900
[  333.534575]  ? __lock_acquire+0x53b/0x4700
[  333.538814]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  333.544365]  alloc_pages_current+0x107/0x210
[  333.548789]  pte_alloc_one+0x1b/0x1a0
[  333.552598]  __do_fault+0x2b9/0x4e0
[  333.556231]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  333.561786]  __handle_mm_fault+0x2cbd/0x3f20
[  333.566213]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  333.571061]  ? find_held_lock+0x35/0x130
[  333.575130]  ? handle_mm_fault+0x322/0xb30
[  333.579388]  ? kasan_check_read+0x11/0x20
[  333.583545]  handle_mm_fault+0x43f/0xb30
[  333.587642]  __get_user_pages+0x7b6/0x1a40
[  333.591908]  ? follow_page_mask+0x19a0/0x19a0
[  333.596424]  ? memset+0x32/0x40
[  333.599715]  populate_vma_page_range+0x20d/0x2a0
[  333.604486]  __mm_populate+0x204/0x380
[  333.608883]  ? populate_vma_page_range+0x2a0/0x2a0
[  333.613834]  do_shmat+0xd50/0x1090
[  333.617391]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  333.622151]  ? fput+0x128/0x1a0
[  333.625460]  __x64_sys_shmat+0xd1/0x170
[  333.629441]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  333.634205]  ? do_shmat+0x1090/0x1090
[  333.638013]  ? lockdep_hardirqs_on+0x415/0x5d0
[  333.642597]  ? trace_hardirqs_on+0x67/0x230
[  333.646932]  do_syscall_64+0x103/0x610
[  333.650828]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  333.656020] RIP: 0033:0x457e39
[  333.659219] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  333.678207] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  333.685920] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  333.693206] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  333.700473] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  333.707743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
[  333.715022] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
[  333.729376] encrypted_key: master key parameter 'user:' is invalid
18:21:28 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372723a000000000000000000"], 0x1, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x1)
ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000040))
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:28 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)
write$apparmor_current(r3, &(0x7f0000000280)=@hat={'changehat ', 0x0, 0x5e, ['/dev/autofs\x00', '@mime_typeposix_acl_access+\x92eth0,.+[procbGPLnodev%nodev\x00', '&R\\\x00', '/dev/btrfs-control\x00', '/dev/ptmx\x00', '/dev/autofs\x00', '/dev/sequencer2\x00']}, 0x9e)

18:21:28 executing program 2 (fault-call:1 fault-nth:7):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:21:28 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:28 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getpriority(0x100080002, 0x0)

[  333.927362] encrypted_key: insufficient parameters specified
[  333.961396] FAULT_INJECTION: forcing a failure.
[  333.961396] name failslab, interval 1, probability 0, space 0, times 0
18:21:28 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  334.043702] CPU: 0 PID: 12002 Comm: syz-executor2 Not tainted 5.0.0-rc5 #60
[  334.050866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  334.060219] Call Trace:
[  334.060249]  dump_stack+0x172/0x1f0
[  334.060274]  should_fail.cold+0xa/0x1b
[  334.070363]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[  334.070382]  ? lock_downgrade+0x810/0x810
[  334.070402]  ? ___might_sleep+0x163/0x280
[  334.070427]  __should_failslab+0x121/0x190
[  334.070450]  should_failslab+0x9/0x14
[  334.091840]  kmem_cache_alloc+0x2be/0x710
[  334.095983]  ? __lock_acquire+0x53b/0x4700
[  334.100213]  ? __sanitizer_cov_trace_const_cmp2+0x18/0x20
[  334.105798]  ptlock_alloc+0x20/0x70
[  334.109429]  pte_alloc_one+0x6d/0x1a0
[  334.113229]  __do_fault+0x2b9/0x4e0
[  334.116864]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  334.122418]  __handle_mm_fault+0x2cbd/0x3f20
[  334.126820]  ? vmf_insert_mixed_mkwrite+0x40/0x40
[  334.131660]  ? find_held_lock+0x35/0x130
[  334.135732]  ? handle_mm_fault+0x322/0xb30
[  334.140011]  ? kasan_check_read+0x11/0x20
[  334.144698]  handle_mm_fault+0x43f/0xb30
[  334.148785]  __get_user_pages+0x7b6/0x1a40
[  334.153026]  ? follow_page_mask+0x19a0/0x19a0
[  334.157529]  ? memset+0x32/0x40
[  334.160809]  populate_vma_page_range+0x20d/0x2a0
[  334.165561]  __mm_populate+0x204/0x380
[  334.169439]  ? populate_vma_page_range+0x2a0/0x2a0
[  334.174380]  do_shmat+0xd50/0x1090
[  334.177943]  ? __x32_compat_sys_shmctl+0xb0/0xb0
[  334.182702]  ? fput+0x128/0x1a0
[  334.185975]  __x64_sys_shmat+0xd1/0x170
[  334.189947]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  334.194715]  ? do_shmat+0x1090/0x1090
[  334.198527]  ? lockdep_hardirqs_on+0x415/0x5d0
[  334.203119]  ? trace_hardirqs_on+0x67/0x230
[  334.207462]  do_syscall_64+0x103/0x610
[  334.211359]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  334.216548] RIP: 0033:0x457e39
[  334.219760] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
18:21:29 executing program 1:
r0 = request_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='+(trustedppp0^.usernodev$user\x00', 0xfffffffffffffffd)
keyctl$instantiate(0xc, r0, &(0x7f0000000140)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'syz', 0x20, 0x5}, 0x2d, 0xfffffffffffffffc)
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f0000000100), 0xfffffffffffffe79, 0xfffffffffffffffe)

18:21:29 executing program 2 (fault-call:1 fault-nth:8):
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  334.238850] RSP: 002b:00007f7bf47adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000001e
[  334.246562] RAX: ffffffffffffffda RBX: 00007f7bf47adc90 RCX: 0000000000457e39
[  334.253863] RDX: 0000000000004000 RSI: 0000000020000000 RDI: 0000000000000000
[  334.261131] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  334.268393] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7bf47ae6d4
[  334.275667] R13: 00000000004c5fb2 R14: 00000000004dafa0 R15: 0000000000000003
18:21:29 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:29 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:29 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0)
getpriority(0x100080002, 0x0)

18:21:29 executing program 1:
r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0)
ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612)
request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)='cpuset[\x00', r0)

18:21:29 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

[  334.730218] encrypted_key: insufficient parameters specified
[  334.740461] encrypted_key: insufficient parameters specified
18:21:29 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)
ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0)

18:21:29 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:29 executing program 1:
add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="555c6b8640d2fa5a69af427fe2a2201f2f0eed42c0c6a830d4d000e41de3bfdb12d4dffb6590c33ac9a3e660abe470279ff96451e4ae40b239618a022121eaa55609580df1534debcceda2ec6805d241bbd864a600ea1bbe95f66c71743fef58f4", 0x61, 0xfffffffffffffffa)
r0 = request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='syz', 0xfffffffffffffffc)
r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
keyctl$instantiate(0xc, r0, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYRES64, @ANYRES32, @ANYBLOB="60db0b10503a05ec52338db03eca7315407a1bb58a267e1bf981624da8d6e02d27012e6dfa40a2a572b90b5cdcea9d3ae7487924bfd14947bc8d2ce27453a4675a324437f7f7e7e7d05e815a7abd263baa2e9e806f3a2ea6d4c41cf18f482471b32aa6466c6728872bf152f7e655a4828608156f8abce4a8efdd5207d4f6998d2ed33bf62981407fc1c73f48bd57f02b8163ec24f3f38bbdb581719633203c3dca278ab289fcafd10ab90200d492ddf6e35471c37d2679bbf4126191a9c520f0242d373012ac0a6786346e9dac9eade9580bd789926a6d6a29fa615dce58eaa9dceb0fb5236c707c5b10", @ANYRES64, @ANYPTR], 0x6, r1)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0xf)
ioctl$KDADDIO(r2, 0x400455c8, 0x0)
ioctl$TIOCSETD(r2, 0x5412, &(0x7f0000000040))
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:29 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:29 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000440))
getpriority(0x0, 0x0)

18:21:29 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x2020)

[  335.007611] Bluetooth: hci0: Frame reassembly failed (-84)
[  335.020861] encrypted_key: insufficient parameters specified
[  335.026982] Bluetooth: hci0: Frame reassembly failed (-84)
[  335.041746] encrypted_key: insufficient parameters specified
[  335.042913] Bluetooth: hci1: Frame reassembly failed (-84)
[  335.055188] Bluetooth: hci1: Frame reassembly failed (-84)
18:21:29 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:29 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000440))
getpriority(0x0, 0x0)

18:21:29 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4002)

18:21:29 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r3 = openat$cgroup_int(r2, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r3, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r3)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:30 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000440))
getpriority(0x0, 0x0)

18:21:30 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:30 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)
openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0)

18:21:30 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4006)

[  337.044401] Bluetooth: hci0: command 0x1003 tx timeout
[  337.050191] Bluetooth: hci0: sending frame failed (-49)
[  337.123595] Bluetooth: hci1: command 0x1003 tx timeout
[  337.129628] Bluetooth: hci1: Frame reassembly failed (-84)
[  339.133585] Bluetooth: hci0: command 0x1001 tx timeout
[  339.138979] Bluetooth: hci0: sending frame failed (-49)
[  339.203595] Bluetooth: hci1: command 0x1001 tx timeout
[  339.209403] Bluetooth: hci1: Frame reassembly failed (-84)
[  341.203619] Bluetooth: hci0: command 0x1009 tx timeout
[  341.283602] Bluetooth: hci1: command 0x1009 tx timeout
18:21:40 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="6e65ca10656372797074667320757365723a6c3ebdde8589967f90416a676c0d8803a6d36848824025fbf3b77df111316db6d37aa2636fcae256834e7ca4087888eb79bf25bfe9797496de92344b9fbb0f3117a021642dcf77d806c0c867eefffea89079d7719767ffec219f0069b049e0734ce52bc91aee4c733e9d092a19740e8626e75a8bbbce88090b476105e9cff77f5dbd65abb28f55f8be2ded0239124274dde2a67c2c2fbc6aa3475ceb4e3e4c40bf"], 0x1, 0x0)
r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
lseek(r0, 0x13, 0x1)
clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff)
r2 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mount(&(0x7f0000000340)=ANY=[@ANYRES16, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESDEC=r0], @ANYRES32=r1, @ANYRESHEX=r2], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000))
getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000003c0)={0xfffffffffffffe01, 0x8, 0x8004, 0xe4, 0x6, 0x8, 0x2, 0x3ff, <r3=>0x0}, &(0x7f0000000400)=0x20)
write$P9_RUNLINKAT(r0, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7)
setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000440)={r3, 0xfff, 0x20}, 0xc)
clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff)
ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000240)={0x4, &(0x7f0000000200)=[{}, {}, {}, {}]})
r4 = getpid()
perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0xfffffffffffffff8, 0x1, 0x4, 0x8, 0x0, 0x2, 0x8804, 0x6, 0x7, 0x54a, 0x7, 0xffffffffffffffc1, 0x81, 0x3, 0x6, 0x9, 0x20, 0xff, 0x3, 0x2, 0x20, 0x6, 0x2, 0x401, 0x1, 0x1ff, 0xaf16, 0xfffffffeffffffff, 0x4, 0x79, 0x0, 0x40000, 0x1, 0x4, 0x3f, 0x9, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000480)}, 0x1000, 0x1, 0x6, 0x7, 0x10001, 0xb6, 0x1000}, r4, 0x1, r2, 0xa)
accept4$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000580)=0x1c, 0x80000)
ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000280)={0x0, 0xfffffffffffffffd})
getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000300)={'HL\x00'}, &(0x7f0000000380)=0x1e)
ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000140)={0x1, 0x1})
socket$inet(0x2, 0x800, 0x9)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:40 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:40 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:40 executing program 0:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0)
r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000440))
getpriority(0x0, 0x0)

18:21:40 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x200000)

18:21:40 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)
ioctl$sock_proto_private(r0, 0x89e0, 0x0)

18:21:40 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x907000)

18:21:40 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:40 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:40 executing program 0:
add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="555c6b8640d2fa5a69af427fe2a2201f2f0eed42c0c6a830d4d000e41de3bfdb12d4dffb6590c33ac9a3e660abe470279ff96451e4ae40b239618a022121eaa55609580df1534debcceda2ec6805d241bbd864a600ea1bbe95f66c71743fef58f4", 0x61, 0xfffffffffffffffa)
r0 = request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='syz', 0xfffffffffffffffc)
r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
keyctl$instantiate(0xc, r0, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYRES64, @ANYRES32, @ANYBLOB="60db0b10503a05ec52338db03eca7315407a1bb58a267e1bf981624da8d6e02d27012e6dfa40a2a572b90b5cdcea9d3ae7487924bfd14947bc8d2ce27453a4675a324437f7f7e7e7d05e815a7abd263baa2e9e806f3a2ea6d4c41cf18f482471b32aa6466c6728872bf152f7e655a4828608156f8abce4a8efdd5207d4f6998d2ed33bf62981407fc1c73f48bd57f02b8163ec24f3f38bbdb581719633203c3dca278ab289fcafd10ab90200d492ddf6e35471c37d2679bbf4126191a9c520f0242d373012ac0a6786346e9dac9eade9580bd789926a6d6a29fa615dce58eaa9dceb0fb5236c707c5b10", @ANYRES64, @ANYPTR], 0x6, r1)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0xf)
ioctl$KDADDIO(r2, 0x400455c8, 0x0)
ioctl$TIOCSETD(r2, 0x5412, &(0x7f0000000040))
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:40 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xa05000)

[  346.026572] encrypted_key: insufficient parameters specified
18:21:40 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x42, 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  346.122462] Bluetooth: hci0: Frame reassembly failed (-84)
[  346.132446] Bluetooth: hci0: Frame reassembly failed (-84)
[  346.146625] encrypted_key: insufficient parameters specified
18:21:41 executing program 1:
r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x6e)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0))
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:41 executing program 2:
mlockall(0xa)
pipe(&(0x7f0000000140)={<r0=>0xffffffffffffffff})
ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f00000001c0)=&(0x7f0000000180))
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0)
ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000040)={0xe, @vbi={0x1, 0x9, 0x3, 0x3436324d, [0x8001], [0x8, 0x9], 0x13b}})
mlockall(0x4)
ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)=<r2=>0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f00000002c0)={{0x6, 0x7, 0xffffffff, 0x7, '\x00', 0x1}, 0x0, 0x20, 0x80, r2, 0x8, 0x80, 'syz1\x00', &(0x7f0000000240)=['/dev/btrfs-control\x00', '[wlan1\x00', '/dev/btrfs-control\x00', '#&proc\x00', '/dev/btrfs-control\x00', '/dev/btrfs-control\x00', 'posix_acl_accessem0^\x00', '*.\x00'], 0x72, [], [0xffffffffffffff35, 0x1ff, 0x2, 0x10001]})

18:21:41 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:41 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  346.423302] encrypted_key: master key parameter 'user:' is invalid
18:21:41 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
truncate(&(0x7f0000000000)='./file0\x00', 0x4)

18:21:41 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)

18:21:41 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6e6577106563727b707466732075843ad2ad23b6bc9a929c4d6eb94d4dd1676dd77ea1d2d8116084a8af32507075d490c88744b673809b26b66c08cde06e671ab6f8e2a8443317432a5da93a95f3862a0c1e606037ef920a84e888be9795f1fb94f60db291d380412002985163b50ce4f1cb15feb31ced00d740e42a87b459b28dd7ccf3b3702743e7ab1f0c4f0029e28e4c102183b1d6a657062ec1f7d4e93fa14d0333e3cd74529d2609e87a8e701a7411d77b78f89351875372ea4d751273ed3ce9ba4949cf0357200e62899d006dd54661af4ab5e9f711b176ab29d60cda13145b2a44fb000016027ba0f2aaaabcdfece851dec67ae0b7ddb9bc6f247943520ebf114e8ee79273b43369bb25a498d45f87a187819a300e7924112d39d49fc413a46a01d1872022dd09a1026f2dd43a94494a16f39b887970efb21b161e7b2b0119131922b19ae16e61ad765e32b59aa980f293786a1248292865946ab0afda40e457ee0977f338608ac557b110c40b123c78d0624ecc0aefa70d4855369970952d045ced00000000000000000000000000000000"], 0x1, 0x0)
r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x8000, 0x0)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00')
sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r1, 0x100, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0xc0, @media='udp\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000040)

18:21:41 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:41 executing program 2:
mlockall(0x2)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x800)
getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000040), &(0x7f0000000080)=0x4)

[  348.163610] Bluetooth: hci0: command 0x1003 tx timeout
[  348.169005] Bluetooth: hci0: sending frame failed (-49)
[  350.243587] Bluetooth: hci0: command 0x1001 tx timeout
[  350.249023] Bluetooth: hci0: sending frame failed (-49)
[  352.323629] Bluetooth: hci0: command 0x1009 tx timeout
18:21:51 executing program 0:
add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="555c6b8640d2fa5a69af427fe2a2201f2f0eed42c0c6a830d4d000e41de3bfdb12d4dffb6590c33ac9a3e660abe470279ff96451e4ae40b239618a022121eaa55609580df1534debcceda2ec6805d241bbd864a600ea1bbe95f66c71743fef58f4", 0x61, 0xfffffffffffffffa)
r0 = request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='syz', 0xfffffffffffffffc)
r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
keyctl$instantiate(0xc, r0, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYRES64, @ANYRES32, @ANYBLOB="60db0b10503a05ec52338db03eca7315407a1bb58a267e1bf981624da8d6e02d27012e6dfa40a2a572b90b5cdcea9d3ae7487924bfd14947bc8d2ce27453a4675a324437f7f7e7e7d05e815a7abd263baa2e9e806f3a2ea6d4c41cf18f482471b32aa6466c6728872bf152f7e655a4828608156f8abce4a8efdd5207d4f6998d2ed33bf62981407fc1c73f48bd57f02b8163ec24f3f38bbdb581719633203c3dca278ab289fcafd10ab90200d492ddf6e35471c37d2679bbf4126191a9c520f0242d373012ac0a6786346e9dac9eade9580bd789926a6d6a29fa615dce58eaa9dceb0fb5236c707c5b10", @ANYRES64, @ANYPTR], 0x6, r1)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0xf)
ioctl$KDADDIO(r2, 0x400455c8, 0x0)
ioctl$TIOCSETD(r2, 0x5412, &(0x7f0000000040))
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:51 executing program 1:
r0 = add_key(&(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="a1be3e360b824f6884d8c879d28181f0a1536cb98e88311f0e64060b1e55835c00afc8bca9c38c4ad6b87cbaae4b72a4015a9b7c93a108820fbafea005c3a3dd81af2d42de3917cc3dbf58082b1f00f1e3f327461e36651472dea607b0058fecf203ee6857d8440e49592596cd077dd5e125f54bbb3dc7bec70227c5e0c6349e4b2055f59d57e7b92baa94322915285a3edd7cbe962cc8ff9dc787e8cc67c54f26a653bcd9a20662e664273c595821c642422cec8393c78a3927774a5e179d4ada005da8c53548638909941cc25f00fe59e1996d84099e19c848fef141176cff96c16d2dc232e9e9", 0xe8, 0x0)
keyctl$instantiate(0xc, 0x0, &(0x7f00000002c0)=ANY=[], 0x0, r0)
r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200, 0x0)
mkdirat$cgroup(r1, &(0x7f0000000040)='syz0\x00', 0x1ff)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:51 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:51 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x1ff)
ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:51 executing program 2:
mlockall(0x2)
shmget$private(0x0, 0x1000, 0x801, &(0x7f000000f000/0x1000)=nil)
shmget(0x2, 0x4000, 0x40, &(0x7f0000237000/0x4000)=nil)
r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)=ANY=[@ANYBLOB="e100000039529800b0b3f5477ff1000000801b371de25106e4bf6f6cec6fa0fc8e201a7037fc51883fa5cbdd585eafe40bd8126c4e26e9d628d5feb705", @ANYRES16=r0, @ANYBLOB="20012dbd7000fbdbdf25090000001c000300080007004e24000008000400ae6b000008000300040000005c00030008000500ac1e000108000800020000000800010001000000080008001100000014000600ff0200000000000000000000000000010800010002000000080008004100000014000200627071300000000000000000000000000800060004000000"], 0x94}, 0x1, 0x0, 0x0, 0x4014}, 0x800)
r1 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x7, 0x8000)
r2 = socket$inet(0x2, 0x807, 0x2)
epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000240))
get_thread_area(&(0x7f0000000000)={0x7f, 0xffffffffffffffff, 0x400, 0x4, 0xc92, 0x80000001, 0x2, 0x4, 0x8, 0x2})
r3 = shmget(0x0, 0x3000, 0x801, &(0x7f000000b000/0x3000)=nil)
shmat(r3, &(0x7f0000ffc000/0x4000)=nil, 0x5000)
r4 = socket$packet(0x11, 0x3, 0x300)
r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00')
sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000300)=ANY=[@ANYBLOB="20010020", @ANYRES16=r5, @ANYBLOB="000329bd7000fcdbdf250d00000030000600040002000800010002000000080001000400000004000200040002000400020008000100ac000000040002009000010044000200080004000400000008000400200000000800040001000000080004001a540000080001001d000000080004004656206a08000400ff7f00000800020000000000100001007564703a73797a3100000000380004001400010002004e20000000020000000000000000200002000a004e240000000100000000000000000000ffff7f00000103000000240007000c000400010400000000000008000100000200000c000300f8000000000000001c0006000400020008000100060000000400020008000100030000000c0002000800010000080000"], 0x120}, 0x1, 0x0, 0x0, 0x10}, 0x20000000)

18:21:51 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)

[  356.447984] encrypted_key: insufficient parameters specified
[  356.467247] encrypted_key: insufficient parameters specified
18:21:51 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, 0x0, 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:21:51 executing program 1:
r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20000, 0x0)
ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=<r1=>0x0)
r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00')
sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r2, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800000000040}, 0x40000)
ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x8, 0x4, 0x18000000000000, 0x9, 0x7, r1})
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:21:51 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  356.595997] Bluetooth: hci0: Frame reassembly failed (-84)
[  356.613184] Bluetooth: hci0: Frame reassembly failed (-84)
[  356.619681] encrypted_key: master key parameter 'user:' is invalid
[  356.633682] encrypted_key: insufficient parameters specified
18:21:51 executing program 1:
r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000040841, 0x0)
getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={<r1=>0x0, 0x9, 0x3, [0x1, 0x8001, 0xe408]}, &(0x7f0000000080)=0xe)
getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000001c0)={r1, 0x79, "c7db8d42705bb0aba4ae07149c6f15ad7e4decdfe9275ac536c55dc0047b50da4734aa52e3e6805db93787f59c1c2b3cd7da455d427786d96accb93356b78eb4c49b0ee5a90898b5f02ed49329fa66b6de3abd40cda4e9c948d9d28ea7c71391a6ea7b1bf80cd51a803c68b43fa0c0c0243a2b10b3ff51b9ba"}, &(0x7f00000000c0)=0x81)
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
socket$nl_route(0x10, 0x3, 0x0)

[  356.640978] encrypted_key: master key parameter 'user:' is invalid
18:21:51 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

[  356.732606] encrypted_key: master key parameter 'user:' is invalid
[  356.755379] encrypted_key: master key parameter 'user:' is invalid
18:21:51 executing program 2:
mlockall(0x4)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)
lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3)

[  358.643597] Bluetooth: hci0: command 0x1003 tx timeout
[  358.649012] Bluetooth: hci0: sending frame failed (-49)
[  360.723733] Bluetooth: hci0: command 0x1001 tx timeout
[  360.729149] Bluetooth: hci0: sending frame failed (-49)
[  362.803663] Bluetooth: hci0: command 0x1009 tx timeout
18:22:01 executing program 0:
add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="555c6b8640d2fa5a69af427fe2a2201f2f0eed42c0c6a830d4d000e41de3bfdb12d4dffb6590c33ac9a3e660abe470279ff96451e4ae40b239618a022121eaa55609580df1534debcceda2ec6805d241bbd864a600ea1bbe95f66c71743fef58f4", 0x61, 0xfffffffffffffffa)
r0 = request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='syz', 0xfffffffffffffffc)
r1 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9)
keyctl$instantiate(0xc, r0, &(0x7f0000000440)=ANY=[@ANYRES16, @ANYRES64, @ANYRES32, @ANYBLOB="60db0b10503a05ec52338db03eca7315407a1bb58a267e1bf981624da8d6e02d27012e6dfa40a2a572b90b5cdcea9d3ae7487924bfd14947bc8d2ce27453a4675a324437f7f7e7e7d05e815a7abd263baa2e9e806f3a2ea6d4c41cf18f482471b32aa6466c6728872bf152f7e655a4828608156f8abce4a8efdd5207d4f6998d2ed33bf62981407fc1c73f48bd57f02b8163ec24f3f38bbdb581719633203c3dca278ab289fcafd10ab90200d492ddf6e35471c37d2679bbf4126191a9c520f0242d373012ac0a6786346e9dac9eade9580bd789926a6d6a29fa615dce58eaa9dceb0fb5236c707c5b10", @ANYRES64, @ANYPTR], 0x6, r1)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0xf)
ioctl$KDADDIO(r2, 0x400455c8, 0x0)
ioctl$TIOCSETD(r2, 0x5412, &(0x7f0000000040))
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)

18:22:01 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
r0 = request_key(&(0x7f0000000080)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)='!%\x00', 0xfffffffffffffffa)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000200)={'syz'}, &(0x7f0000000040), 0xfffffffffffffdf5, r0)

18:22:01 executing program 3:
syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000500)='memory.low\x00', 0x2, 0x0)
perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0)
write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000380)={0x7}, 0x7)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f00000003c0)='cpuset.memory_spread_page\x00', 0x2, 0x0)
write$cgroup_int(r2, &(0x7f0000000200)=0x42, 0x12)
write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x0)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
keyctl$join(0x1, 0x0)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
close(r2)
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:22:01 executing program 2:
mlockall(0x2)
r0 = socket$inet6(0xa, 0x5, 0x0)
clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff)
r1 = getpid()
sched_setscheduler(r1, 0x5, &(0x7f0000000200))
setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x76, &(0x7f00000000c0)=[@in6={0xa, 0x0, 0x0, @mcast2}], 0x8)
shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x4000)

18:22:01 executing program 4:
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x12)
write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000100), 0x2)
r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0)
r4 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)
ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4)
socket$inet_smc(0x2b, 0x1, 0x0)
ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, 0x0)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x5, &(0x7f0000000280)='em1,{md5sumposix_acl_access^\x00', 0xffffffffffffffff}, 0xfffffd7b)

18:22:01 executing program 5:
ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0)
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x40080, 0x0)
setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180)={0x2}, 0x4)
bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e)
socket$inet6_udplite(0xa, 0x2, 0x88)
socket$alg(0x26, 0x5, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$sock_ax25_SIOCDELRT(r1, 0x890c, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]})
r2 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0)
ppoll(&(0x7f0000000000)=[{r2}], 0x1, 0x0, 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x00\x03\xff\x02\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x06\x00', 0xc7, 0x80003})
r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x1080000000, 0x0)
ioctl$IMCLEAR_L2(r1, 0x80044946, &(0x7f0000000340)=0x1f)
close(r2)
msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000380)=""/48)
close(r3)
r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0)
ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000140)={0x0, 0x6, 0x5, 0x7f})
r5 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0)

18:22:01 executing program 1:
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e657710656372797074667320757365723a"], 0x1, 0x0)
add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x1e9a)

[  366.759205] Bluetooth: hci0: Frame reassembly failed (-84)
[  366.759979] BUG: unable to handle kernel paging request at ffffffffffffffd6
[  366.771974] #PF error: [normal kernel read fault]
[  366.776926] PGD 8874067 P4D 8874067 PUD 8876067 PMD 0 
[  366.782219] Oops: 0000 [#1] PREEMPT SMP KASAN
[  366.786736] CPU: 0 PID: 12266 Comm: syz-executor0 Not tainted 5.0.0-rc5 #60
[  366.793826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  366.803355] RIP: 0010:h4_recv_buf+0x1ea/0xda0
[  366.807872] Code: b6 14 10 48 89 c8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 d7 0a 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 45 d0 4c 8d 60 70 <0f> b7 58 2a 4c 89 e0 48 c1 e8 03 0f b6 04 10 84 c0 74 08 3c 03 0f
[  366.826756] RSP: 0018:ffff88804e28fa30 EFLAGS: 00010246
[  366.832133] RAX: ffffffffffffffac RBX: 0000000000000000 RCX: ffffffffffffffd6
[  366.839393] RDX: dffffc0000000000 RSI: ffffffff84ecf372 RDI: 0000000000000005
[  366.846676] RBP: ffff88804e28fab8 R08: ffff88809192c2c0 R09: 0000000000000003
[  366.853933] R10: ffffed1015d05bcf R11: ffff8880ae82de7b R12: 000000000000001c
[  366.861197] R13: ffff88809e761340 R14: ffff88804e28fb98 R15: 0000000000000001
[  366.868450] FS:  00007f1cddf34700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
[  366.876661] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  366.882523] CR2: ffffffffffffffd6 CR3: 000000009de50000 CR4: 00000000001406f0
[  366.889810] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  366.897064] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  366.904401] Call Trace:
[  366.907026]  ? __lock_is_held+0xb6/0x140
[  366.911072]  ? check_preemption_disabled+0x48/0x290
[  366.916090]  h4_recv+0xe4/0x200
[  366.919356]  hci_uart_tty_receive+0x22b/0x530
[  366.923839]  ? hci_uart_write_work+0x710/0x710
[  366.928480]  tty_ioctl+0x936/0x14d0
[  366.932095]  ? tty_vhangup+0x30/0x30
[  366.935823]  ? mark_held_locks+0x100/0x100
[  366.940067]  ? debug_smp_processor_id+0x1c/0x20
[  366.944734]  ? __fget+0x340/0x540
[  366.948193]  ? ___might_sleep+0x163/0x280
[  366.952341]  ? __might_sleep+0x95/0x190
[  366.956303]  ? tty_vhangup+0x30/0x30
[  366.960002]  do_vfs_ioctl+0xd6e/0x1390
[  366.963878]  ? selinux_file_ioctl+0x46f/0x5e0
[  366.968356]  ? selinux_file_ioctl+0x125/0x5e0
[  366.972835]  ? ioctl_preallocate+0x210/0x210
[  366.977229]  ? selinux_file_mprotect+0x620/0x620
[  366.981970]  ? iterate_fd+0x360/0x360
[  366.985817]  ? nsecs_to_jiffies+0x30/0x30
[  366.989976]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  366.995505]  ? security_file_ioctl+0x93/0xc0
[  366.999900]  ksys_ioctl+0xab/0xd0
[  367.003339]  __x64_sys_ioctl+0x73/0xb0
[  367.007231]  do_syscall_64+0x103/0x610
[  367.011106]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[  367.016282] RIP: 0033:0x457e39
[  367.019479] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  367.038381] RSP: 002b:00007f1cddf33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[  367.046079] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39
[  367.053333] RDX: 0000000020000040 RSI: 0000000000005412 RDI: 0000000000000003
[  367.060584] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000
[  367.067836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1cddf346d4
[  367.075091] R13: 00000000004c2146 R14: 00000000004d4958 R15: 00000000ffffffff
[  367.082351] Modules linked in:
[  367.085529] CR2: ffffffffffffffd6
[  367.088976] ---[ end trace ec7b49f00d5bd3f0 ]---
[  367.093722] RIP: 0010:h4_recv_buf+0x1ea/0xda0
[  367.098200] Code: b6 14 10 48 89 c8 83 e0 07 83 c0 01 38 d0 7c 08 84 d2 0f 85 d7 0a 00 00 48 ba 00 00 00 00 00 fc ff df 48 8b 45 d0 4c 8d 60 70 <0f> b7 58 2a 4c 89 e0 48 c1 e8 03 0f b6 04 10 84 c0 74 08 3c 03 0f
[  367.118023] RSP: 0018:ffff88804e28fa30 EFLAGS: 00010246
[  367.123382] RAX: ffffffffffffffac RBX: 0000000000000000 RCX: ffffffffffffffd6
[  367.130634] RDX: dffffc0000000000 RSI: ffffffff84ecf372 RDI: 0000000000000005
[  367.137887] RBP: ffff88804e28fab8 R08: ffff88809192c2c0 R09: 0000000000000003
[  367.145138] R10: ffffed1015d05bcf R11: ffff8880ae82de7b R12: 000000000000001c
[  367.152391] R13: ffff88809e761340 R14: ffff88804e28fb98 R15: 0000000000000001
[  367.159665] FS:  00007f1cddf34700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000
[  367.167883] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  367.173745] CR2: ffffffffffffffd6 CR3: 000000009de50000 CR4: 00000000001406f0
[  367.181015] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  367.188268] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  367.195516] Kernel panic - not syncing: Fatal exception
[  367.201836] Kernel Offset: disabled
[  367.205459] Rebooting in 86400 seconds..